Abstract
Innovative growth of IoT Technology has enhanced the service delivery aspects of defence sector in terms of high-tech surveillance, and reliable defence mechanisms. Along with the sensing capability for ubiquitous events, IoT Technology provides means to deliver services in time sensitive and information intensive manner. In this paper, a framework for IoT based activity monitoring of defence personnel is presented to detect the precursors of suspiciousness in terms of information outflow that can compromise the national security. Though maintaining intellectual defence personnel remained a major area of concern for every nation, still investigating reports of recent terrorist attacks in different countries have discovered the number of suspicion factors from their daily activities. The work presented in this study focuses on these factors in terms of efficient monitoring of social activities and analyzing it over suspicious scale. Moreover, Suspicious Index (SI) is defined for every personnel on the basis of their activities that can compromise national security directly or indirectly. Furthermore, automated game theoretic decision making model is presented to aid the monitoring officials in suppressing the probability of information outflow. In order to validate the system, two types of evaluations are performed. In one case, an imitative environment is considered to monitor 10 college students’ daily engagements for 7 days. The results are compared with the state-of-the-art techniques of data assessment. In the second case, a mathematical evaluation for the game theoretic decision making is performed. Results in both cases show that the proposed model achieves better performance in efficient monitoring of suspicious activities and effective decision making.
Similar content being viewed by others
References
Acampora G, Gaeta M, Loia V, Vasilakos AV (2010) Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Trans Auton Adapt Syst (TAAS). doi:10.1145/1740600.1740604
Aggarwal CC, Zhai C (2012) Mining text data. Springer Science & Business Media
Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols and applications. IEEE Commun Surv Tutorials 17:2347–2376. doi:10.1109/COMST.2015.2444095
Antonić A, Marjanović M, Pripui K, Zarko IP (2016) A mobile crowd sensing ecosystem enabled by CUPUS: Cloud-based publish/subscribe middleware for the Internet of Things. Futur Gener Comput Syst 56:607–622. doi:10.1016/j.future.2015.08.005
Amazon Cloud Services. https://aws.amazon.com/ec2/. Accessed 14 January 2016
Azzedin F, Yahaya M (2016) Modeling BitTorrent choking algorithm using game theory. Futur Gener Comput Syst 55:255–265. doi:10.1016/j.future.2015.02.007
Baba AI, Lu H, Pedersen TB, Xie X (2013) A graph model for false negative handling in indoor RFID tracking data. In: 21st ACM international conference on advances in geographic information systems. ACM. doi:10.1145/2525314.2525461
Barua S, Sander J (2014) Mining statistically significant co-location and segregation patterns. IEEE Trans Knowl Data Eng 26:1185–1199. doi:10.1109/TKDE.2013.88
Bjelopera JP, Randol MA (2011) The Federal Bureau of Investigation and Terrorism Investigations. In: Congressional research service, library of congress. https://fas.org/sgp/crs/terror/R41780.pdf. Accessed 10 January 2016
Bosch X (2012) Beyond 9/11: health consequences of the terror attacks outside the USA. Intern Emerg Med 7:159–161. doi:10.1007/s11739-011-0748-7
Castillejo P, Martinez JF, Rodriguez-Molina J, Cuerva A (2013) Integration of wearable devices in a wireless sensor network for an E-health application. IEEE Wirel Commun 20:38–49. doi:10.1109/MWC.2013.6590049
Chen C, Huang J, He L, Li H (2014) Preconditioning for accelerated iteratively reweighted least squares in structured sparsity reconstruction. In: IEEE conference on computer vision and pattern recognition. doi:10.1109/CVPR.2014.353
Chen G, Kotz D (2000) A survey of context-aware mobile computing research. https://pdfs.semanticscholar.org/0c50/772e92971458402205097a67a2fd015575fd.pdf. Accessed 10 January 2016
Chen Z, Xia F, Huang T, Bu F, Wang H (2013) A localization method for the Internet of Things. J Supercomput 63:657–674. doi:10.1007/s11227-011-0693-2
Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10:2233–2243. doi:10.1109/TII.2014.2300753
Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51:107–113. doi:10.1145/1327452.1327492
De Martino B, Kumaran D, Seymour B, Dolan RJ (2006) Frames, biases, and rational decision-making in the human brain. Science 313:684–687. doi:10.1126/science.1128356
Ding G, Guo Y, Zhou J, Gao Y (2016) Large-Scale Cross-Modality Search via Collective Matrix Factorization Hashing. IEEE Trans Image Process 25:5427–5440. doi:10.1109/TIP.2016.2607421
Fang S, Xu L, Pei H, Liu Y, Liu Z, Zhu Y, Zhang H (2014) An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans Ind Inform 10:548–558. doi:10.1109/TII.2013.2257807 10.1109/TII.2013.2257807
Flouvat F, Nguyen Van Soc JF, Desmier E, Selmaoui-Folcher N (2015) Domain-driven co-location mining. Geoinformatica 19:147–183. doi:10.1007/s10707-014-0209-3
Ganz F, Barnaghi P, Carrez F (2013) Information abstraction for heterogeneous real world internet data. IEEE Sensors J 13:3793–3805. doi:10.1109/JSEN.2013.2271562
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29:1645–1660. doi:10.1016/j.future.2013.01.010
Hanjalic A, Xu L-Q (2005) Affective video content representation and modeling. IEEE Trans Multimedia 7:143–154. doi:10.1109/TMM.2004.840618
Harwood B (2016) FANNG: Fast Approximate Nearest Neighbour Graphs. In: IEEE conference on computer vision and pattern recognition (CVPR). doi:10.1109/CVPR.2016.616
He C, Fan X (2013) Toward ubiquitous healthcare services with a novel efficient cloud platform. IEEE Trans Biomed Eng 60:230–234. doi:10.1109/TBME.2012.2222404
Hirsch M, Carli P, Nizard R, Riou B, Baroudjian B, Baubet T, Fontaine JP (2015) The medical response to multisite terrorist attacks in Paris. Lancet 386:2535–2538. doi:10.1016/S0140-6736(15)01063-6
Huang Y, Pei J, Xiong H (2006) Mining co-location patterns with rare events from spatial data sets. Geoinformatica 10:239–260. doi:10.1007/s10707-006-9827-8
IBM SPSS Statistics Software. http://www01.ibm.com/software/analytics/spss/. Accessed 30 January 2016
James B, Takabi H, Ahn G (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8:24–31. doi:10.1109/MSP.2010.186
Kaur N, Sood SK (2015) Cognitive decision making in smart industry. Comput Ind 74:151–161. doi:10.1016/j.compind.2015.06.006
Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sensors J 13:3846–3853. doi:10.1109/JSEN.2013.2263379 10.1109/JSEN.2013.2263379
Kontschieder P, Fiterau M, Criminisi A, Rota Bulo S (2015) Deep neural decision forests. In: IEEE international conference on computer vision (ICVR). doi:10.1109/ICCV.2015.172
Kronstadt KA (2008) Terrorist attacks in Mumbai, India, and implications for US interests. In: Library of congress washington DC congressional research service. http://www.dtic.mil/get-tr-doc/pdf?AD=ADA492902. Accessed 2 January 2016
Kumar S, Udupa R (2011) Learning hash functions for cross-view similarity search. In: International joint conference on artificial intelligence. doi:10.5591/978-1-57735-516-8/IJCAI11-230
Lauría EJ, Duchessi PJ (2006) A Bayesian belief network for IT implementation decision support. Decis Support Syst 42:573–1588. doi:10.1016/j.dss.2006.01.003
Leye W (2016) Facilitating Mobile Crowdsensing from both Organizers’ and Participants’ Perspectives. Dissertation.Telecom SudParis
Li S, Da Xu L, Wang X (2013) Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans Ind Inform 9:2177–2186. doi:10.1109/TII.2012.2189222
Liang M, Hu X (2015) Recurrent convolutional neural network for object recognition. In: IEEE conference on computer vision and pattern recognition (CVPR). doi:10.1109/CVPR.2015.7298958
Lin Z, Ding G, Han J, Wang J Cross-view retrieval via probability-based semanticspreserving hashing. IEEE Transactions on Cybernetics. doi:10.1109/TCYB.2016.2608906
Lin J, Keogh E, Wei L, Lonardi S (2007) Experiencing sax: a novel symbolic representation of time series. Data Min Knowl Disc 15:107–144. doi:10.1007/s10618-007-0064-z
Liu Y, Xu L, Li M (2016) The Parallelization of Back Propagation Neural Network in MapReduce and Spark. Int J Parallel Prog. doi:10.1007/s10766-016-0401-1
Lu G, Yan Y, Sebe N, Kambhamettu C (2014) Knowing Where I Am: Exploiting Multi-Task Learning for Multi-view Indoor Image-based Localization. BMVC. doi:10.5244/C.28.125
Manikonda L, Mangalampalli A, Pudi V (2010) UACI: Uncertain associative classifier for object class identification in images. In: Image and vision computing new zealand (IVCNZ). doi:10.1109/IVCNZ.2010.6148859
Moreira-Matias L, Mendes-Moreira J, Gama J, Brazdil P (2012) Text categorization using an ensemble classifier based on a mean co-association matrix. In: International workshop on machine learning and data mining in pattern recognition. Springer, Berlin Heidelberg. doi:10.1007/978-3-642-31537-4_41
Najafi B, Aminian K, Paraschiv-Ionescu A, Loew F, Bula CJ, Robert P (2003) Ambulatory system for human motion analysis using a kinematic sensor: monitoring of daily physical activity in the elderly. IEEE Trans Biomed Eng 50:711–723. doi:10.1109/TBME.2003.812189
Nash J (1951) Non-cooperative games. Ann Math 54:286–295. doi:10.2307/1969529
Song J, Yang Y, Yang Y, Huang Z, Shen HT (2013) Inter-media hashing for large-scale retrieval from heterogeneous data sources. In: International conference on management of data. doi:10.1145/2463676.2465274 10.1145/2463676.2465274
St J, Oniga S, Buchman A (2015) Real time human activity monitoring, vol 44. http://ami.ektf.hu/uploads/papers/finalpdf/AMI44from187to196.pdf. Accessed 10 January 2016
Tan J (2015) A Game-Theoretic Framework for Vehicle-to-Grid Frequency Regulation Considering Smart Charging Mechanism. IEEE Trans Smart Grid. doi:10.1109/TSG.2016.2524020
Tang J, Hua X-S., Wang M, Gu Z, Qi G-J., Wu X (2009) Correlative linear neighborhood propagation for video annotation. IEEE Trans Syst Man Cybern 39:409–416. doi:10.1109/TSMCB.2008.2006045 10.1109/TSMCB.2008.2006045
Tong S, Chang E (2001) Support vector machine active learning for image retrieval. Ninth ACM international conference on Multimedia. doi:10.1145/500141.500159
Wang Y, Wei J, Ren S, Shen Y (2016) Toward integrity assurance of outsourced computing a game theoretic perspective. Futur Gener Comput Syst 55:87–100. doi:10.1016/j.future.2015.08.010
Wang F, Qi S, Gao G, Zhao S, Wang X (2016) Logo information recognition in large-scale social media data. Multimedia Systems 22:63–73. doi:10.1007/s00530-014-0393-x
Wang L, Tao J, Ranjan R, Marten H, Streit A, Chen J, Chen D (2013) G-Hadoop: MapReduce across distributed data centers for data-intensive computing. Futur Gener Comput Syst 29:739–750. doi:10.1016/j.future.2012.09.001
Xu Y., Agyemang B, Wu s., Liu M (2017) Procedure Graph Model For Automatic RFID Data Processing Service Management. IEEE Internet of Things Journal. doi:10.1109/JIOT.2017.2661326
Xu B, Da Xu L, Cai H, Xie C, Hu J, Bu F (2014) Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Ind Inform 10:1578–1586. doi:10.1109/TII.2014.2306382
Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trtans Circ Syst Video Technol 24:2077–2089. doi:10.1109/TCSVT.2014.2335852
Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21:573–576. doi:10.1109/LSP.2014.2310494
Zayani MH, Gauthier V, Slama I, Zeghlache D (2012) Tracking topology dynamicity for link prediction in intermittently connected wireless networks. In: 8th international wireless communications and mobile computing conference (IWCMC).IEEE. arXiv:1205.3328v1
Zhang GA, Gu JY, Bao ZH, Xu C, Zhang SB (2014) Joint routing and channel assignment algorithms in cognitive wireless mesh networks. Trans Emerg Telecommun Technol 25:294–307. doi:10.1002/ett.2560
Zhao S, Yao H, Gao Y, Ji R, Xie W, Jiang X, Chua TS (2016) Predicting personalized emotion perceptions of social images. In: Proceedings of the 2016 ACM on multimedia conference. ACM. doi:10.1145/2964284.2964289
Zhao S, Yao H, Sun X (2013) Video classification and recommendation based on affective analysis of viewers. Neurocomputing 119:101–110. doi:10.1016/j.neucom.2012.04.042
Zhao S, Yao H, Gao Y, Ji R, Ding G (2016) Continuous probability distribution prediction of image emotions via multi-task shared sparse regression. IEEE Transactions on Multimedia. doi:10.1109/TMM.2016.2617741
Zheng J, Cai Y, Chen X, Li R, Zhang H (2015) Optimal base station sleeping in green cellular networks: A distributed cooperative framework based on game theory. IEEE Trans Wirel Commun 14:4391–4406. doi:10.1109/TWC.2015.2420233
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bhatia, M., Sood, S.K. Game theoretic decision making in IoT-assisted activity monitoring of defence personnel. Multimed Tools Appl 76, 21911–21935 (2017). https://doi.org/10.1007/s11042-017-4611-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4611-3