ContextAiDe: End-to-End Architecture for Mobile Crowd-sensing Applications

被引:1
|
作者
Pore, Madhurima [1 ]
Chakati, Vinaya [1 ]
Banerjee, Ayan [1 ]
Gupta, Sandeep K. S. [1 ]
机构
[1] Arizona State Univ, IMPACT Lab, 517 BYE, Tempe, AZ 85281 USA
关键词
Mobile crowd-sensing; context aware; edge computing; middleware; MODEL;
D O I
10.1145/3301444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile crowd-sensing (MCS) enables development of context-aware applications by mining relevant information from a large set of devices selected in an ad hoc manner. For example, MCS has been used for real-time monitoring such as Vehicle ad hoc Networks-based traffic updates as well as offline data mining and tagging for future use in applications with location-based services. However, MCS could be potentially used for much more demanding applications such as real-time perpetrator tracking by online mining of images from nearby mobile users. A recent example is tracking the miscreant responsible for the Boston bombing. We present a new design approach for tracking using MCS for such complex processing in real time. Since MCS applications assume an unreliable underlying computational platform, most typically sample size for recruited devices is guided by concerns such as fault tolerance and reliability of information. As the real-time requirements get stricter coupled with increasing complexity of data-mining approaches, the communication and computation overheads can impose a very tight constraint on the sample size of devices needed for realizing real-time operation. This results in trade-off in acquiring context-relevant data and resource usage incurred while the real-time operation requirements get updated dynamically. Such effects have not been properly studied and optimized to enable real-time MCS applications such as perpetrator tracking. In this article, we propose ContextAiDe architecture, a combination of API, middleware, and optimization engine. The key innovation in ContextAiDe is context-optimized recruitment for execution of computation-and communication-heavy MCS applications in edge environment. ContextAiDe uses a notion of two types of contexts, exact (hard constraints), which have to be satisfied, and preferred (soft constraints), which may be satisfied to a certain degree. By adjusting the preferred contexts, ContextAiDe can optimize the operational overheads to enable real-time operation. ContextAiDe provides an API to specify contexts requirements and the code of MCS app, offload execution environment, a middleware that enables context-optimized and a fault-tolerant distributed execution. ContextAiDe evaluation using a real-time perpetrator tracking application shows reduced energy consumption of 37.8%, decrease in data transfer of 24.8%, and 43% less time compared to existing strategy. In spite of a small increase in the minimum distance from the perpetrator, iterations of optimization tracks the perpetrator successfully. Proactively learning the context and using stochastic optimization strategy minimizes the performance degradation caused due to uncertainty (<20%) in usage-dependent contexts.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] An end-to-end QoS architecture for ensuring the reliable delivery of broadband applications
    Koutsouris, Nikos
    Buburuzan, Teodor
    Loziak, Krzysztof
    Sykas, Efstathios
    2008 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2008, : 371 - +
  • [22] End-to-end quality-of-service coordination for mobile multimedia applications
    Guenkova-Luy, T
    Kassler, AJ
    Mandato, D
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004, 22 (05) : 889 - 903
  • [23] SQAMPS: Secure Quorum Architecture for Mobile Presence Services with End-to-End Encryption
    Madankar, Dipti
    Deshmukh, Aaradhana
    Maheshkar, Vaishali
    Mihovska, Albena
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 608 - 613
  • [24] A QoS architecture with end-to-end QoS guarantees in mobile IPv6
    Nie, Gang
    Qing, Xiuhua
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 897 - 900
  • [25] On the effectiveness of end-to-end security for Internet-integrated sensing applications
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 87 - 93
  • [26] Low end-to-end delay fuzzy networking protocol for mobile wireless sensing
    Mazaheri, Mohammad
    Kavian, Yousef S.
    Sharif, Hamid
    Rashvand, Habib F.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (15): : 2406 - 2418
  • [27] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [28] A scalable end-to-end QoS architecture
    Hoang, Doan B.
    Phan, H. T.
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 677 - 682
  • [29] An end-to-end QoS management architecture
    Shankar, M
    De Miguel, M
    Liu, JWS
    PROCEEDINGS OF THE FIFTH IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM, 1999, : 176 - 189
  • [30] End-to-end variational quantum sensing
    Maclellan, Benjamin
    Roztocki, Piotr
    Czischek, Stefanie
    Melko, Roger G.
    NPJ QUANTUM INFORMATION, 2024, 10 (01)