Future Trends of IoT, 5G Mobile Networks, and AI: Challenges, Opportunities, and Solutions

Ji Su Park* and Jong Hyuk Park**

Abstract

Abstract: Internet of Things (IoT) is a growing technology along with artificial intelligence (AI) technology. Recently, increasing cases of developing knowledge services using information collected from sensor data have been reported. Communication is required to connect the IoT and AI, and 5G mobile networks have been widely spread recently. IoT, AI services, and 5G mobile networks can be configured and used as sensor-mobile edge-server. The sensor does not send data directly to the server. Instead, the sensor sends data to the mobile edge for quick processing. Subsequently, mobile edge enables the immediate processing of data based on AI technology or by sending data to the server for processing. 5G mobile network technology is used for this data transmission. Therefore, this study examines the challenges, opportunities, and solutions used in each type of technology. To this end, this study addresses clustering, Hyperledger Fabric, data, security, machine vision, convolutional neural network, IoT technology, and resource management of 5G mobile networks.

Keywords: Artificial Intelligence , Internet of Things , Machine Vision , 5G Mobile Network

1. Introduction

The key technologies of the 4th industrial revolution include Internet of Things (IoT), 5G mobile networks, and artificial intelligence (AI). In particular, it collects data from sensors through IoT and transmits the collected data to the server using 5G mobile networks. The transmitted data are used in AI through various processes. In this process, the detailed functions of each core skill are required.

IoT requires a technology that transmits data along with a clustering technology that creates a group of widespread sensors. In addition, 5G mobile networks require technology for resource management, which is a component of each network. AI technology requires various models—e.g., convolutional neural network (CNN) and k-nearest neighbors (kNN)—in various fields. Security technologies, such as intrusion detection, modified malware detection technology, and blockchain technology, are also essential in each field.

This paper introduces 18 novel and enhanced studies. We present diverse kinds of paradigms to subjects that address different kinds of research areas, such as IoT, 5G mobile networks, and AI. Therefore, the work discusses the following technologies in detail: Stay point spatial clustering-based technology, digital evidence management model based on Hyperledger Fabric, aircraft recognition using machine vision, CNN model-based voting and ensemble system, hierarchical semantic clipping and sentence extraction, N-step sliding recursion formula, routing protocol for improving the lifetime of a wireless sensor network, fault diagnosis of wind power generator blade, variant malware detection techniques, resource management in 5G mobile networks, and application of blockchain in multiple fields of financial services. Futuristic and hot-issue topics from the academe and industries are described. The work mainly aims to provide hot and trendy research to researchers rapidly.

2. Future Trends of IoT, 5G Mobile Networks, and AI

Liao [1] proposed a hot spot analysis method for identifying popular tourist attractions based on improved DBSCAN algorithm on trajectory data. The proposed method is based on the statistical distribution characteristics of data to determine parameters, such as neighborhood radius and density threshold, adaptively. The improved DBSCAN algorithm has been compared with DBSCAN and kmeans on three different datasets to prove its effectiveness and efficiency. In addition, the Getis-Ord Gi* hotspot analysis and mapping are conducted in ArcGIS software using the proposed method. The experiment results demonstrate that the proposed method outperforms traditional methods and classifies hotspot effectively.

Jeong et al. [2] proposed a digital evidence management model based on the blockchain using Hyperledger Fabric and docker to achieve reliability and integrity. This model can be more secure than traditional centralized management systems that are vulnerable from risks, such as damage and manipulation through malicious insiders, because the user cannot modify and delete the evidence data in the proposed model. Moreover, transparency and reliability are provided by taking advantage of the blockchain technique. The authors implemented the proposed method using Hyperledger Fabric and docker. Then, the reliability of this model is demonstrated by confirming that an external attacker cannot modify the transaction and chaincode.

Liu et al. [3] proposed a new localization approach based on symmetric sub-array multiple-input multiple-output radar to deal with a subsurface target by reverse projection. This approach reconstructs signals to find multiple objects at different distances accurately using symmetric sub-array. It also introduces reverse projection for acquiring the distance-independent direction of arrival estimates and obtains the localizations of subsurface targets with different distances. Simulation results show that the proposed method is more efficient than existing methodologies, and the optimization method is effective.

Gong et al. [4] proposed a new system for evaluating urban water security by composing four categories through 21 urban water security factors and 5 sub-systems based on water poverty index (WPI) theory to assess urban water poverty. The system analyzed the contribution rates of the five WPI sub-systems in urban water poverty; namely, resource, access, capacity, use, and environment, through the least-squares method. Moreover, this system divides the city into four divisions: the dual factor drive type, the three factor drive type, the four factor drive type, and the five factor drive type. To analyze the effectiveness of this system, the WPI scores of 14 cities have been analyzed, and the analysis results show that the proposed system is efficient and effective.

Chen et al. [5] proposed a remote sensing image aircraft detection method based on enhanced Yolov3 to improve the resolution and the target detection of the input image. In this method, the aircraft data set was reclustered using k-means algorithm to improve aircraft detection and optimized network structure by introducing the inception module and multiscale prediction. Experiments with RSOD-Dataset have been conducted to prove the effectiveness of this model, and the experimental results demonstrated that the performance was improved compared with that of existing method.

Jhang [6] conducted a study to compare with majority voting, softmax-based voting, and ensemble scheme to predict the gender on the photo. In this study, the majority vote used the “argmax” of the outputs of the final fully connected layer of CNN models as inputs to the voter, and the softmax-based voting used the softmax as an output of CNN models. The ensemble scheme used CNN models combined with one more fully connected layer. The experimental results demonstrate that softmax-based voting outperformed the majority voting method. The performance of the fine-tuning process of ensemble models, however, is better than softmax-based voting, but softmax-based voting is faster and more efficient.

Yan and Guo [7] proposed a neural extractive summarization approach (i.e., JhscSe) with joint hierarchical sentence semantic clipping and selection to solve the repeat problem on news document summarization. More specifically, for redundant information filtering, a hierarchical selective strategy that used bi-layer selected extraction on sentence and document was applied in the encoder-subnetwork. For sentence extraction, joint sentence scoring and redundant information clipping was performed on the document. The experimental results show that the proposed model outperforms the baseline models on Chinese and English datasets and solves the repeat information problem.

Yu et al. [8] proposed a new multistep recursive algorithm based on the N-step sliding recursion formula for variance calculation of the time-varying data series with O(1) time complexity (constant time) to reduce computing time. First, they prove the one-step recursive algorithm of the variance of fixed-length sequences using sliding windows. Second, they extend to the N-step recursion. In the paper, numerical simulation has been conducted on the one-step recursive algorithm and the N-step recursive algorithm to verify accuracy and efficiency, respectively. The simulation results show that the efficiency of the variance calculation on the time-varying data series is improved.

Abdurohman et al. [9] proposed the modified end-to-end secure low-energy adaptive clustering hierarchy (ME-LEACH) to overcome WSN’s energy limitations. ME-LEACH aims to improve the performance of energy aware LEACH (E-ELACH) by investigating the transmission mechanisms that reduce the prevalence of high energy consumption from direct data transmission from cluster head (CH) to base station (BS).

The CH in ME-LEACH finds the nearest CH and uses it as the next hop, thereby forming a CH chain, in which the data transmission path of CH sends data to the BS. The authors demonstrated that the proposed method has a more stable and higher throughput than SEEC and EERRCUR and a better network life than E-LEACH algorithm.

Huang [10] proposed the page-level re-write interval prediction, which was a run-time system that recorded and analyzed memory access history at the page level to predict future memory access to all pages. He presented the problems of existing main, full-size and incremental check point methods and proposed a new incremental check point mechanism by predicting memory access pattern in the application. The experimental results show that the new incremental checkpoint mechanism can achieve a speed increase over the existing incremental checkpoints.

Peng et al. [11] proposed safe circle synthetic minority over-sampling technology (SC-SMOTE) for freezing diagnosis and wind turbine prediction. The authors present the data imbalance and errors in the decision boundaries as problems in the existing methods. Moreover, they propose a dataset optimization algorithm to improve the data imbalances and errors. The proposed SC-SMOTE was combined with the fault diagnosis method kNN algorithm to carry out the simulation, thereby proving the superiority of fault diagnosis and diagnosis accuracy by comparing its performance with that of the existing SMOTE algorithm.

The amount of malware is increasing exponentially, and the new malware is a variant of the existing malware. Kang and Won [12] presented the difficulties of variant malware detection in existing signaturebased malware detection methods and utilized machine running to study the detection of variant malware. The authors performed static and dynamic analyses of malicious code datasets to extract features and construct machine learning models. The authors also confirmed higher accuracy than the existing method through experiments.

Chie et al. [13] discussed the latest technologies and current tasks on wireless access network resource allocation in the 5G network and provided guidance on resource allocation development. The authors reviewed the recent resource allocation development of wireless access and core networks; classified them from a multidimensional perspective, including application goals, service types, and resource types; and discussed their advantages and disadvantages. The unresolved problem of 5G resource allocation and the direction of research direction of research were also presented.

Software refactoring is the process of reorganizing existing software code while maintaining the same external behavior. In this paper, Agnihotri and Chug [14] investigate the analysis of code smell, method of applying a specific refactoring method to remove bad smell from source code, and how software refactoring affects software quality in order to develop more readable and less complex codes by improving the non-functional properties of software. In order to do this, the authors apply various analysis methods for 68 papers from papers published between 2001 and 2019, and the results of software metric, identification and correction of bad smell, and application of refactoring technology are expressed in detail according to research questions.

Wang et al. [15] focused on studies on the fields of various financial industries where blockchain technology was applied, and the core technologies for the development of blockchain financial services and current practices were required. To do this, the basic contents and the structure of the blockchain in the financial industry must be described, and the kind of influence the technical factors of the blockchain can exert in the financial services field should be investigated according to their technical characteristics.

In addition, the authors investigated in detail how the blockchain technology is being used in various fields of financial services, such as in crowdfunding, credit investigation, P2P lending, supply chain finance, cross-border remittance, and anti-money laundering. As a result, the authors presented the technical issues, challenges, and opinions for applying blockchain technology in financial services and suggested ways to apply blockchain in the future financial industry effectively

Wang et al. [16] proposed s an optimal algorithm for determining the size of a fast coding unit based on neighbor prediction to improve the performance of HEVC, one of the video compression techniques. HEVC uses a quad-tree coding tree unit (CTU) structure to increase coding efficiency, but it requires very high computational complexity due to a thorough search process for the optimal CU partition.

Since embedded devices that have power limitations or need real-time processing have very limited resources, however, the authors propose an effective algorithm that reduces computational complexity. In order to quickly predict the optimal partitioning mode for the current CU through neighbor prediction technology, the proposed algorithm reduces the partitioning operation and unnecessary predictions for HEVC by using the partition information of the left, up, and left-up CUs. As a result, it shows that the algorithm proposed in this paper can reduce the coding time by about 19.0% and increase the BD-rate (Bjontegaard Delta rate) by only 0.102% compared to the standard reference software of HM16.1.

Sicato et al. [17] proposed a software-defined IDS-based cloud architecture for providing a secure IoT environment in IoT network. The author describes several detection methods of IDS for abnormal behavior in the IoT environment and presents the differences between existing studies and the proposed method by comparing and analyzing several characteristics. After explaining security issues that can occur in the IoT environment by dividing each layer of IoT architecture, they propose a software-defined IDS-based cloud architecture that incorporates IDS on SDN's OpenFlow switch for a safe IoT system against threats by IoT architecture layer. From the experiments and analysis, it was confirmed that the proposed technology provides better attack detection power and accuracy than the existing IDS system.

Bu et al. [18] proposed a content-based image retrieval system that combines the complete local binary pattern (CLBP) texture function and color autocorrelation function based on multi-resolution multidirection (MRMD) filtering. The authors analyzed the previous studies on the color histogram and color autocorrelogram. In the paper, based on the analysis, the authors illustrate the texture feature extraction method using MRMD filtering-based CLBP by considering the features of color and texture and the dimensions of the feature vector. The experiment was conducted using six databases of Corel and visTex, and as a result of the experiment, the proposed scheme shows better image retrieval performance than the CLBP method, color autocorrelogram method using RGB, and multi-channel decoded LBP method.

3. Conclusion

This paper features 18 high-quality articles following a rigorous review process. It reviewed the technologies developed in various research fields, such as clustering, Hyperledger Fabric, data, security, machine vision, CNN, IoT technology, and resource management of 5G mobile networks, to provide insights into the future paradigm. Published articles on the following topics are also presented in this paper: stay point spatial clustering based technology; digital evidence management model based on Hyperledger Fabric; aircraft recognition using machine vision; CNN model-based voting and ensemble system; hierarchical semantic clipping and sentence extraction; N-step sliding recursion formula; routing protocol for improving the lifetime of a wireless sensor network; fault diagnosis of wind power generator blade; variant malware detection techniques; resource management in 5G mobile networks; application of blockchain in multiple fields of financial services, and so on.

Biography

Ji Su Park
https://orcid.org/0000-0001-9003-1131

He received his B.S. and M.S. degrees in Computer Science from Korea National Open University, Korea, in 2003 and 2005, respectively and Ph.D. degrees in Computer Science Education from Korea University, 2013. He is currently a Professor in Department of Computer Science and Engineering from Jeonju University in Korea. His research interests are in grid computing, mobile cloud computing, cloud computing, distributed system, computer education, and AIoT. He is employed as associate editor of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS. He has received "best paper" awards from the CSA2018 conferences and "outstanding service" awards from CUTE2019.

Biography

James J. (Jong Hyuk) Park
https://orcid.org/0000-0003-1831-0309

He received Ph.D. degrees from the Graduate School of Information Security, Korea University, Korea and the Graduate School of Human Sciences of Waseda University, Japan. Dr. Park served as a research scientist at the R&D Institute, Hanwha S&C Co. Ltd., Korea from December 2002 to July 2007, and as a professor at the Department of Computer Science and Engineering, Kyungnam University, Korea from September 2007 to August 2009. He is currently employed as a professor at the Department of Computer Science and Engineering and the Department of Interdisciplinary Bio IT Materials, Seoul National University of Science and Technology (SeoulTech), Korea. Dr. Park has published about 200 research papers in international journals and conferences. He has also served as the chair, program committee chair or organizing committee chair at many international conferences and workshops. He is a founding steering chair of various international conferences including MUE, FutureTech, CSA, UCAWSN, etc. He is employed as editor-in-chief of Human-centric Computing and Information Sciences (HCIS) by Springer, The Journal of Information Processing Systems (JIPS) by KIPS, and the Journal of Con-vergence (JoC) by KIPS CSWRG. He is also the associate editor or editor of fourteen international journals, including eight journals indexed by SCI(E). In addition, he has been employed as a guest editor for various international journals by such publishers as Springer, Elsevier, Wiley, Oxford University Press, Hindawi, Emerald, and Inderscience. Dr. Park’s research interests include security and digital forensics, human-centric ubiquitous com-puting, context awareness, and multimedia services. He has received "best paper" awards from the ISA-08 and ITCS-11 conferences and "outstanding leadership" awards from IEEE HPCC-09, ICA3PP-10, IEE ISPA-11, and PDCAT-11. Furthermore, he received an "outstanding research" award from SeoulTech in 2014. Also, Dr. Park's research interests include human-centric ubiquitous computing, vehicular cloud computing, information security, digital forensics, secure communications, multimedia computing, etc. He is a member of the IEEE, IEEE Computer Society, KIPS, and KMMS.

References

  • 1 Y. Liao, "Hot spot analysis of tourist attractions based on stay point spatial clustering," Journal of Information Processing Systems, vol. 16, no. 4, pp. 750-759, 2020.doi:[[[10.3745/JIPS.04.0177]]]
  • 2 J. Jeong, D. Kim, B. Lee, Y. Son, "Design and implementation of a digital evidence management model based on Hyperledger Fabric," Journal of Information Processing Systems, vol. 16, no. 4, pp. 760-773, 2020.doi:[[[10.3745/JIPS.04.0178]]]
  • 3 Q. Liu, Y. He, C. Jiang, "Localization of subsurface targets based on symmetric sub-array MIMO radar," Journal of Information Processing Systems, vol. 16, no. 4, pp. 774-783, 2020.doi:[[[10.3745/JIPS.04.0179]]]
  • 4 L. Gong, H. Wang, C. Jin, L. Lu, M. Ma, "Type drive analysis of urban water security factors," Journal of Information Processing Systems, vol. 16, no. 4, pp. 784-794, 2020.doi:[[[10.3745/JIPS.04.0180]]]
  • 5 L. Chen, L. Zhou, J. Liu, "Aircraft recognition from remote sensing images based on machine vision," Journal of Information Processing Systems, vol. 16, no. 4, pp. 795-808, 2020.doi:[[[10.3745/JIPS.02.0136]]]
  • 6 K. Jhang, "V oting and ensemble schemes based on CNN models for photo-based gender prediction," Journal of Information Processing Systems, vol. 16, no. 4, pp. 809-819, 2020.doi:[[[10.3745/JIPS.02.0137]]]
  • 7 W. Yan, J. Guo, "Joint hierarchical semantic clipping and sentence extraction for document summari-zation," Journal of Information Processing Systems, vol. 16, no. 4, pp. 820-831, 2020.doi:[[[10.3745/JIPS.04.0181]]]
  • 8 L. Yu, G. He, A. K. Mutahir, "N-step sliding recursion formula of variance and its implementation," Journal of Information Processing Systems, vol. 16, no. 4, pp. 832-844, 2020.doi:[[[10.3745/JIPS.04.0182]]]
  • 9 M. Abdurohman, Y. Supriadi, F. Z. Fahmi, "A modified E-LEACH routing protocol for improving the lifetime of a wireless sensor network," Journal of Information Processing Systems, vol. 16, no. 4, pp. 845-858, 2020.doi:[[[10.3745/JIPS.03.0142]]]
  • 10 Y. Huang, "Fast incremental checkpoint based on page-level rewrite interval prediction," Journal of Information Processing Systems, vol. 16, no. 4, pp. 859-869, 2020.doi:[[[10.3745/JIPS.01.0058]]]
  • 11 C. Peng, Q. Chen, L. Zhang, L. Wan, X. Yuan, "Research on fault diagnosis of wind power generator blade based on SC-SMOTE and kNN," Journal of Information Processing Systems, vol. 16, no. 4, pp. 870-881, 2020.doi:[[[10.3745/JIPS.04.0183]]]
  • 12 J. Kang, Y. Won, "A study on variant malware detection techniques using static and dynamic features," Journal of Information Processing Systems, vol. 16, no. 4, pp. 882-895, 2020.doi:[[[10.3745/JIPS.03.0145]]]
  • 13 W. C. Chie, S. Y. Huang, C. F. Lai, H. C. Chao, "Resource management in 5G mobile networks: survey and challenges," Journal of Information Processing Systems, vol. 16, no. 4, pp. 896-914, 2020.doi:[[[10.3745/JIPS.03.0143]]]
  • 14 M. Agnihotri, A. Chug, "A systematic literature survey of software metrics, code smells and refactoring techniques," Journal of Information Processing Systems, vol. 16, no. 4, pp. 915-934, 2020.doi:[[[10.3745/JIPS.04.0184]]]
  • 15 Y. Wang, D, K. Kim, D. Jeong, "A survey of the application of blockchain in multiple fields of financial services," Journal of Information Processing Systems, vol. 16, no. 4, pp. 935-958, 2020.doi:[[[10.3745/JIPS.04.0185]]]
  • 16 J. Wang, H. Wang, F. Xu, J. Liu, L. Cheng, "A fast CU size decision optimal algorithm based on neighborhood prediction for HEVC," Journal of Information Processing Systems, vol. 16, no. 4, pp. 959-974, 2020.doi:[[[10.3745/JIPS.04.0186]]]
  • 17 J. C. S. Sicato, S. K. Singh, S. Rathore, J. H. Park, "A comprehensive analyses of intrusion detection system for IoT environment," Journal of Information Processing Systems, vol. 16, no. 4, pp. 975-990, 2020.doi:[[[10.3745/JIPS.03.0144]]]
  • 18 H. H. Bu, N. C. Kim, B. J. Y un, S. H. Kim, "Content-based image retrieval using multi-resolution multi-direction filtering-based CLBP texture features," Journal of Information Processing Systems, vol. 16, no. 4, pp. 991-1000, 2020.doi:[[[10.3745/JIPS.02.0138]]]