0% found this document useful (0 votes)
313 views54 pages

10 - Survey

Uploaded by

hazwan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
313 views54 pages

10 - Survey

Uploaded by

hazwan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

This article has been accepted for publication in a future issue of this journal, but has not been

fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.Doi Number

Multimedia Internet of Things:


A Comprehensive Survey
ALI NAUMAN1, YAZDAN AHMAD QADRI1, MUHAMMAD AMJAD2,
YOUSAF BIN ZIKRIA1, (Senior Member, IEEE),
MUHAMMAD KHALIL AFZAL3, (Senior Member, IEEE), SUNG WON KIM1
1
Department of Information and Communication Engineering, Yeungnam University, 280 Daehak-Ro, Gyeongsan-si, Gyeongsangbuk-do 38541,
Republic of Korea.
2
School of Computer Science and Electronic Engineering, University of Essex, Essex CO4 3SQ, United Kingdom.
3
Department of Computer Science, COMSATS University Islamabad, Wah Campus, Pakistan.

Corresponding author: Sung Won Kim ([email protected]).

ABSTRACT The immense increase in multimedia-on-demand traffic that refers to audio, video, and images,
has drastically shifted the vision of the Internet of Things (IoT) from scalar to Multimedia Internet of Things
(M-IoT). IoT devices are constrained in terms of energy, computing, size, and storage memory. Delay-
sensitive and bandwidth-hungry multimedia applications over constrained IoT networks require revision of
IoT architecture for M-IoT. This paper provides a comprehensive survey of M-IoT with an emphasis on
architecture, protocols, and applications. This article starts by providing a horizontal overview of the IoT.
Then, we discuss the issues considering the characteristics of multimedia and provide a summary of related
M-IoT architectures. Various multimedia applications supported by IoT are surveyed, and numerous use cases
related to road traffic management, security, industry, and health are illustrated to show how different M-IoT
applications are revolutionizing human life. We explore the importance of Quality-of-Experience (QoE) and
Quality-of-Service (QoS) for multimedia transmission over IoT. Moreover, we explore the limitations of IoT
for multimedia computing and present the relationship between the M-IoT and emerging technologies
including event processing, feature extraction, cloud computing, Fog/Edge computing and Software-Defined-
Networks (SDNs). We also present the need for better routing and Physical-Medium Access Control (PHY-
MAC) protocols for M-IoT. Finally, we present a detailed discussion on the open research issues and several
potential research areas related to emerging multimedia communication in IoT.

INDEX TERMS Multimedia Internet of Things (M-IoT), multimedia communication, Internet of Multimedia
Things (IoMT), multimedia computing, Quality-of-Experience (QoE), Quality-of-Service (QoS), multimedia
routing, Medium Access Control (MAC).

I. INTRODUCTION these smart objects are known as Smart Services (SS) [3]-
The amalgamation of the physical and digital world over the [6]. IoT has created new opportunities for machines to
traditional Internet paved the way for the future Internet of communicate with each other and extend the offered
Things (IoT). IoT is envisaged as the network model to fill applications. Currently, 23 billion devices are connected to
the gap between the cyber and physical world [1]. The core the Internet [7], and these numbers will stretch to 30 billion
concept of the IoT is to connect the pervasive objects around by 2020 [8]. Conventionally, IoT was assimilated relatively
us, such as Radio Frequency Identification (RFID) tags, in data sensing devices, particularly in the Machine to
mobile devices, sensors and actuators to the Internet through Machine (M2M) environment [9]. Vigorous growth in the
a wired or wireless network. Hence, it enables the objects to connected devices to the Internet during the last decade and
interact with each other and their neighbors to enhance the abrupt demand for multimedia traffic has given rise to the
efficiency of the system [1]. Several researchers have emergence of the Multimedia Internet of Things (M-IoT).
defined IoT in various contexts [2]: “The integration of tiny The equilibrium between QoS data and best-effort data is
devices known as Smart Objects (SO), usually battery now in transit towards an increase in multimedia QoS data.
operated equipped with a Microcontroller (MCU) and Currently, IoT is an assortment, comprising of M2M,
transceivers into the global Internet. The services offered by Human-to-Machine (H2M), Human-to-Human (H2H), and

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Real-time
Multimedia
Multimedia in
Smart Agriculture Multimedia in
Smart Health

Multimedia in
IoT
Multimedia in Multimedia in
Smart-Home Traffic
Monitoring

Multimedia in Multimedia in
Security Industry

FIGURE 1. The overall vision of integrating multimedia applications of every domain in IoT, developing a smart city and transforming human lives,
i.e., multimedia in agriculture, smart health, security, industrial process, road management systems, and real-time applications.

Machine in/or Humans (MiH) communications (MiH efficient feature extraction, event processing,
devices may include human embedded chips, medical encoding/decoding, energy-aware computation, lightweight
monitoring probes, and Global Positioning System (GPS)) and priority-based routing, QoS and QoE maintaining
[10]. performance metrics, effective channel access, and fair-
M-IoT smart objects are usually resource-constrained, in MAC protocols.
terms of energy, memory storage, and processing power. To Real-world multimedia applications include an example of
make the devices smaller, cost-effective and energy- rescue vehicles based emergency response systems, traffic
efficient, sensors are usually designed to be battery operated monitoring, GPS based path tracking, agricultural
or solar powered with only a few kilobytes of memory, and monitoring, crime inspection, smart cities, smart homes,
limited processing power in megahertz. Multimedia QoS smart museum, surveillance systems, security system for
data shows antagonistic behavior as compared to emblematic authentication and authorization, multimedia-based e-health,
IoT scalar data. M-IoT devices require higher bandwidth, patient monitoring in smart hospitals, and industrial
bulky memory resources, and higher computational power to monitoring systems. Fig. 1 conceptualize the multimedia
analyze and process the procured multimedia data. Table I communication in IoT in every domain-specific applications.
shows the difference between scalar and multimedia IoT This article presents a comprehensive state of the art
data. The traditional multimedia application involves the survey on M-IoT. There are several published research
data transmission of point-to-point, point to multipoint, or papers that cover different aspects of IoT. To the best of our
multipoint to multipoint. On the contrary, M-IoT knowledge, this article is the first that covers the studies
applications require immense data transmission during
multipoint-to-point communication (e.g., the surveillance TABLE I
system of the entire smart city) or multipoint-to-multipoint. COMPARISON OF SCALAR AND MULTIMEDIA IOT DATA
Required
Dynamic network, heterogeneous data, higher throughput, Parameter
Scalar IoT Data Multimedia Data
QoS, and delay sensitivity over such resource-constrained Data Size Mgebytes to
Bytes to Kilobytes
M-IoT smart objects escalates the challenges for M-IoT. (Approximate) Gigabytes
Multimedia data i.e., audio, image, and video is set of Kilobytes to Mgebytes to
Memory
Megabytes Gigabytes
unstructured features. Transmission of such bulky and Kilohertz to Megahertz to
unstructured data over bandwidth and computationally Processing
Megahertz Gigahertz
scarce network requires efficient and intelligent network Storage
Kilobytes to
Gigabytes
topology. The addition of multimedia data acquisition and Megabytes
Bandwidth Kilobytes Megabytes
communication requires revision and amplification of the
Delay Sensitivity Low High
traditional IoT system, which we refer to as M-IoT. The Power Comsumption Low High
revision of IoT for multimedia communication requires

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

TABLE II
THE COMPARISON OF COMPREHENSIVE SURVEY ON M-IOT
Survey of Survey of Existing Survey on M- Survey on QoE Existing works Existing work
Existing Work on work on M-IoT IoT and QoS Metrics on M-IoT on M-IoT PHY-
M-IoT Applications Computing for M-IoT Routing MAC Protocols
Architectures  Road  Event  MOS Metric for Protocols for
 Agent Based Management Processing QoE  Multimedia  Industrial
 SDN Based  Biometric and  Multimedia  DMOS Metric Routing Applications
Article

 Big Data Based  Distributed  Healthcare


Year

Retina Scanning Compression for QoE


 Fog/Edge Based  Surveillance  Cloud  User Satisfaction Routing Applications
 AI Based  Industrial Computing for QoE  Cross Layer  Surveillance
 Health  Fog/Edge  QoS Objective Routing  Military
 SDN Metrics  Multicast and Applications
Computing Multi-hop  Precision
 QoS-Aware Agriculture

[4] 2015 × × × × × ×
[13] 2014 × × × × × ×
[12] 2018 × × × × × ×
[19] 2016 × × × ×  ×
[11] 2015 × × × × × ×
[45] 2018 × ×  × × ×
[46] 2018 × × × × × ×
[20] 2017 × × × × × ×
This Article      

specifically targeting multimedia communication in IoT in section outlines the various multimedia applications and uses
the context of the above-mentioned requirements. cases concerning M-IoT. However, this article does not
cover a detailed survey on M-IoT specifically. An in-depth
A. Contributions of this Survey Article
discussion on various enabling technologies, i.e., MAC
In summary, this work aims to make the following
protocols and network layer protocols, is missing.
contributions:
Discussion on future machine-type-communication and
 To provide a detailed survey of various M-IoT network
integration with 5th generation (5G) cellular communication
architectures.
is not found. Furthermore, various QoS and QoE depending
 To survey the various M-IoT applications i.e., traffic
factors and Information-Centric Network (ICN) approach
monitoring, habitat monitoring, surveillance for public
regarding M-IoT are not discussed. Multimedia computation
safety, industrial monitoring, and health monitoring.
technologies are not found in this article.
 To discuss the design for M-IoT communication by
The discussion on M-IoT in the context of architecture,
summarizing performance metrics for M-IoT
enabling technologies, MAC and routing protocols is not
architectures.
found in the recent survey articles on IoT [2], [11], [12]. The
 To survey the M-IoT computing paradigm comprising
existing survey on energy-efficient M-IoT is presented in
multimedia data compression, event processing, fog/edge
[13]. This study explains the working of each layer of the
computing, cloud computing, and Software-Defined
traditional IoT architecture; however, the intrinsic nature of
Networks (SDNs) for data computing.
multimedia data is not considered in any aspect.
 To discuss various routing protocols in the context of
Different routing protocols are discussed in [14], [15],
multimedia data delivery in M-IoT.
[16], [17], [18]. A detailed survey on multimedia routing in
 To provide a survey on different physical MAC (PHY-
wireless sensor networks is presented in [19], [20]. However,
MAC) protocols for M-IoT.
these articles present a brief overview of multimedia routing
 To provide open issues, challenges, and future research
and the comparison of various routing standards. It merely
directions involving M-IoT.
discusses the issues and challenges of current multimedia
B. Comparison of Related Survey Articles data requirements. Current M-IoT takes not only QoS but
Alvi et al. in [4] delineate the concept of M-IoT. The article QoE into consideration that is dependent not only on network
is classified into two categories: M-IoT vision and, M-IoT parameters but user's hardware capabilities itself.
applications and use cases. In the first category, authors have MAC protocols and efficient resource allocation standards
presented the vision of M-IoT and proposed four-layer multi- are presented in [21], [22], [23], [24]. BlueVoice has been
agent-based M-IoT architecture. Requirements and open evaluated for multimedia services in real-time IoT devices in
issues in each layer are also discussed in this section. [25]. QoS is analysed in [26], [27], [28], [29], [30], while
Moreover, IoT has been analyzed in-depth in the context of QoE is studied in [31], [32], [33] [34], [35], [36]. The
multimedia data. The authors have also discussed several concept of Quality of Information (QoI) and ICN using a
video encoding and compressing techniques. The second distributed algorithm for multimedia data collection is

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

proposed in [37]. Amulya et al. [31] have presented the comparison of different architectures of multimedia
concept of Quality of Things (QoT) for M-IoT. However, it communication in IoT. Diverse applications of M-IoT are
lacks QoS objectives. The rest of this article discusses the discussed in Section III. Section IV summarizes the
introduction of the virtual layer for virtual object performance metrics, design requirements and existing work
representation and cross-layer communication. Cross-layer to maintain quality in M-IoT. Section V presents the M-IoT
design related to M-IoT is presented in [34], [38], [39]. computing paradigm, including multimedia coding, event
Karthik et al. [40] have proposed a secure video processing, cloud, Fog/Edge computing, and computing
transmission energy-aware encryption scheme for M-IoT. using SDNs. Section VI covers various routing protocols for
Using Dictionary Learning (DL) and Approximate Message M-IoT, while PHY-MAC protocols are discussed in Section
Passing (AMP). A compressed sensing technique is proposed VII. Section VIII discovers the open issues, challenges, and
for M-IoT in [41]. Various video encoding schemes and future research directions for multimedia communication in
multimedia sensing are outlined in [42], [43]. Performance IoT. Finally, section IX concludes the article. Table III
comparison of Advance Video Codings (AVC) H.265 and accords the list of acronyms used throughout this article. Fig.
H.264 is presented in [44]. A detailed survey on multimedia 2 shows the classification of this article.
big data computation is presented in [45]. Salman et al. in
TABLE III
[46] present a survey on IoT from the perspective of Fog and THE LIST OF ACRONYMS AND CORRESPONDING DEFINITIONS
SDN technologies. Articles [47], [48], [49], present review
Acronyms Definitions
on multimedia in road traffic management and biometric
security. AI Artificial Intelligence
However, all these studies do not include a survey on BS Base Station
CNN Convolutional Neural Network
multimedia communication in any form. Existing challenges,
CMOS Complementary Metal Oxide Semiconductor
issues, and proposed work from the perspective of M-IoT are CoT Cloud of Things
not presented in any of the articles. DL Deep Learning
Comparison: From the word comprehensive, this article DNN Deep Neural Network
provides an in-depth overview of M-IoT. This article GHz Gigahertz
specifies the limitations of IoT architecture and user H2H Human to Human
requirements of multimedia data in order to revise IoT H2M Human to Machine
architecture. This enables us to cover a review of various IoT IoT Internet of Things
ICN Information Centric Network
architectures supporting wireless multimedia IMS IP Multimedia System
communication. Computation is the key feature required for LAN Local Area Network
M-IoT. Limitations of cloud computing in exhausting the LLN Low Power and Lossy Network
bandwidth and energy-constrained networks are identified. LTE Long-Term Evolution
Advantages of Fog/Edge computation to assist cloud MAC Medium Access Control
computing are presented. SDNs are moving the IoT MCU Microcontroller
architecture towards network virtualization. SDNs in the MEC Mobile Edge Computing
M-IoT Multimedia Communication in IoT
perspective of M-IoT is detailed in this article. This article
M2M Machine to Machine
also discusses the use of Machine Learning (ML) as an MiH Machine in Human
important aspect for feature extraction from multimedia data ML Machine Learning
which extracts meaningful information from unstructured NB-IoT NarrowBand Internet of Things
multimedia data. In addition, this paper presents various NN Neural Network
event processing mechanisms to reduce network overhead PHY Physical Layer
and latency. QoS and QoE metrics are well defined and PLR Packet Loss Ratio
evaluated in this article by comparing it with existing work. QoE Quality of Experience
QoI Quality of Information
Routing and PHY-MAC protocols are well surveyed in the
QoS Quality of Service
literature. However, contemporary literature lacks the Routing Protocol for Low-Power and Lossy
consideration of multimedia data nature and requirements. RPL
Networks
This article presents a comprehensive overview of SDD Software Defined Devices
multimedia applications and uses cases. This article only SDN Software Defined Network
includes research work that specifically considers SVM Support Vector Machine
multimedia (audio, video, image, visual) data in IoT. To the SVR Support Vector Regression
THz Terahertz
best of our knowledge, this article is the first to present a
UE User Equipment
comprehensive survey on M-IoT. A comparison of this V2V Vehicle-to-Vehicle
article in the context of M-IoT with other survey articles is WAN Wide Area Network
presented in Table II. WPAN Wireless Personal Area Network
C. Article Structure 5G 5th Generation
IPv6 over Low-Power Wireless Personal Area
The remainder of the paper is organized as follows: 6LoWPAN
Networks
Section II presents an overview of IoT architecture and a

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2964280, IEEE Access

Taxonomy of This Article

IoT and M-IoT Performance Metrics for M-IoT Computing Routing Protocol For M- PHY-MAC Protocols For Future Research
Applications of M-IoT
Architecture M-IoT Paradigm IoT M-IoT Directions

Image based Video Energy- Scheduling


Mean Security and Privacy
Things Traffic Coding Aware IEEE [280,286]
Layer [62] Monitoring Opinion Multimedia [336-341]
[179,180] [15,37,248,2
[78-81] Square Routing 802.15.4 Intelligent
Complexity 49] Backoff Scalability [306-311]
Lane and [155- and Quality
Network Quality of Load [287]
IoT Architecture Accident 157],[162] Coding and Assessment
Layer [63] Experience Balancing
Road Detection Compression [179,182]
Synchronization Interoperability [306-311]
Degradation [250]
Management [82-90] GPU [283]
Application Image and Mean Encryption Fault Cross Layer Protocols [344-
Layer [66] video Based Opinion [189] Tolerant 346]
Square Coexistence
Authenticati Issues and [251]
[163] Zigbee with IEEE ML and DL Protocols
-on and Challenges
Delay- 802.15.4 [293]
Crime [183]
User Aware
Detection Multi-event 5G and Beyond 5G
Multi-Agent Satisfaction [252]
[93-98] Detection Adaptive [353-360]
Based [4,68] [161] IEEE
Traffic Lights [190-192] Mobility Channel
Management Motion [253] 802.11 [295-297] Tactile Internet [364-368]
AI and Event QoS-Aware
M-IoT [91,92] Estimation DL Channel
SDNs Based Processing Routing Cluster Molecular Communication
Architecture [69] Bandwidth [193] Access
Bio-Metric Based [369-371]
Authenticati [168] Motion Aware [298]
Encryption [254-255] Augment and Virtual Reality
Fog/Edge- -on [99-102]
Packet loss [194]
Cross-Layer Q-Learning
Cloud SDN Based [361-363]
Voice Bio- Quality of ratio, delay, Protocols based [299]
Hybrid [70] metrics Energy [38-39],[259- [256-257]
Security and Service throughput Efficient Routing
[103,104] Conservati 262] [347-350]
Big Data Surveillance [169],[172] ML Channel
on [199] Distributed
Multimodal Retina Access [300]
[258] Channel Access
Computing [71] Authentication Cloudlet Multicast
Resource Cloud Based
[105-109] and Hop
Multimedia Management Computing [200-202] Dynamic
based [20] Multicast Energy-Awareness [342]
Traffic Security Image and Video [170] NB-IoT Multicasting
Event [14],[264]
[73,76] Surveillance Systems [302]
Detection
[110-126] Link Energy Harvesting Awareness
[205] Crowd Sourcing Multi-Hop
Image and Video based Energy and Stream [265-267] Adaption
Manufacturing Analysis in Industry Conservation Processing [217] [303]
[127-132] Green Communication [343]
[173],[175] Resource
Smart Multimedia based Smart Agriculture Fog/Edge
Allocation D2D
Industry [136-141] Computing Communication Lightweight Computing
[216]
Image Processing based Smart [304] [330-333]
Museum [133-135] DL based Edge
Processing [221] Feature Extraction
Personal SDNs for [312-317]
Bandwidth and BlueVoice
Health Computing BLE
Latency Reduction [25] Data Prioritization
Monitoring Bio-medical [225,227,234-237] [318-324]
[142-144] Training [224]
Health
Monitoring Video Surveillance Real-Time Processing
Robotic Ocular
Ambulance Disease [214]
and Surgery Detection QoE Metrics for M-IoT
Scheduling [334,335]
[145-148] [150,151] [213]

FIGURE 2. Taxonomy of This Article

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Application Layer Application Layer Application Sub-layer


Application Layer

Applications Cloud Service Cyber-Physical


Storage Mapping
Service Sub-layer
Service Manager Analytical Storage and
Query Event Computation Decisions
Software Define Device Layer Application Layer
Manager Processing Cloud Layer
Access Core
Storage Networking Network Network
Middleware Network Layer Network Layer
Middleware Network Layer

Physical Layer Device Layer Sensing Layer Things Layer


Data Sensing
(a) (b) (c) (d) (e)

FIGURE 3. (a) Basic three elements of IoT: power-constrained hardware sensors or devices to sense and acquire the data, a middleware to
process, analyze, and transmit the desired data, and application which visualizes the processed data and results. The existing proposed
IoT architectures. (b) Middle-ware based [56] , (c) Software-defined-device based [58], (d) Cloud-based [12], (e) Traditional three-layer IoT
architecture [61].

II. IoT and Multimedia IoT Architecture which visualizes the processed data and results. These
A. IOT ARCHITECTURE three fundamental elements are depicted in Fig. 3(a), and it
“Anything, anytime, anywhere, any media” has become forms the basis of IoT architecture: 1) things layer, 2)
the axiom for IoT communication. Kevin Ashton first network layer, and 3) application layer [61].
coined the term IoT in 1999 [50]. The concept of the M2M 1) THINGS LAYER
has gained momentum after the development of the first It is the bottom layer in IoT architecture, also known as
RFID. RFID uses an electromagnetic field that the perception layer, device layer, or sensor layer [62]. This
automatically detects and wirelessly tracks the object. layer is composed of a sensing hardware, scalar or
RFID is a vital component of the IoT since it links millions multimedia sensors, and actuators, depending upon the
and billions of physical objects with the cyber world [51]. services required by the application. Sensing devices have
Currently RFID is used in various IoT applications such as uplink data transmission mode while actuators have
supply chain management, gestural detection [52], E- downlink data functionality. Access devices have the
health [53], mobile-based payments [54], and intelligent competency to operate in both uplink and downlink data
restaurants [55]. Diverse IoT applications and devices from transmission mode [58]. The main objective of this layer is
various manufacturers create heterogeneity in the network, to interconnect things in the IoT network. These devices
which increases the challenges to achieve a unified and sense, acquire and pre-process data from the physical
interoperable standard. Thus to speak and understand world either locally or send the data to the centralized
various languages, numerous architectures are proposed. servers through gateways using Local Area Network or
However, no one has converged to a standardized Wireless Personal Area Network (LAN/WPAN) via short-
architecture. range low power enabling technologies like Zigbee,
Cloud computing layer-based architecture is proposed in Bluetooth Low Energy (BLE), Ethernet, IEEE 802.15.4,
[12]. The motivation and requirement of middleware based etc.
IoT architecture are presented in [56]. The integrated 2) NETWORK LAYER
architecture of short-range micro IoT (e.g., IEEE 802.15.4 It is the middle layer in IoT architecture, also known as
and IEEE 802.11 standards) and macro Sub-GHz the transmission layer [63]. Virtually it is divided into two
technologies is proposed in [57]. Pengfei at al. [58] sub-layers: the access network and the core network. The
proposed the concept of the Software-Defined Device main functionality of the network layer is to process the
received data from the things layer. Therefore, it
(SDD) layer-based IoT architecture. Security and cognitive
layer-based IoT architecture for enhancing efficiency, determines the energy-efficient optimum route to transmit
scalability, security, and privacy is presented in [59]. The the data to the IoT servers, devices and applications via the
article [60] proposes an energy-efficient IoT architecture Internet using one of the communication networks such as
based on cloud computing, sensor sleep intervals, and QoI. WiFi, Ethernet, 3G, Long-Term Evolution (LTE), 5G or
Fig. 3 shows the IoT architectures proposed in the satellite network [64]. The access network layer is
responsible for interconnecting various devices and
literature.
The traditional IoT comprises three fundamental applications through interfaces or gateways among
elements: mostly power-constrained hardware devices to Heterogeneous Networks (HetNet) using various
sense and acquire the data, a middleware to process, communication protocols. The core network is responsible
analyze, and transmit the desired data, and application for determining the optimum route. Currently, the network
layer should also support both Internet Protocol version 4

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

IP

Identification
Fog Node Multimodal Computational/
Layer Middleware/AI integrated SDN
module/Multi-Agent Layer

Physical/Device/Object Layer Communication/Network Layer/


Application Layer
Module based channels
[4]
[68]
[69]
[70]
[71]

FIGURE 4. The existing proposed M-IoT network architectures: multi-agent-based M-IoT architecture [4], agent-based M-IoT architecture [68],
AI-based SDNs for multimedia traffic management architecture [69], Fog-Cloud hybrid M-IoT architecture [70], and Big data layered M-IoT
architecture [71].

TABLE IV
M-IOT PROPOSED ARCHITECTURES
Architecture Proposal Proposed Layers Article Year
Multimedia Sensing
Reporting and Addressability
Multi-agent Based M-IoT Architecture [4] 2015
Multimedia-Aware Cloud
Multi-Agent Systems
Applications
Service Execution Agents
Agent Based M-IoT Architecture Resource Connectors [68] 2018
M-IoT Services and Resources
Multimedia Devices and Communications
IoT Network
AI-Based SDN for Multimedia Traffic
Network Heads [69] 2018
Management Architecture
AI-Based Cloud SDN
Remote Cloud
Fog-Cloud Hybrid M-IoT Architecture Fog Node [70] 2018
Mobile Client
Identification Layer
Physical Layer
Communication Layer
Big Data Layered M-IoT Architecture [71] 2018
Middleware Layer
Multimodal Computational Layer
Application Layer
Key Management [74]
Batch Rekeying [75] [73]
Multimedia Traffic Security Architecture 2011
Authentication [76] [76]
Watermaking [77]

(IPv4) and IPv6 networks considering the requirements of also exploited as sink nodes for an end to end
cross-domain interoperability in heterogeneous IoT communication, such as Device-to-Device (D2D)
networks. Furthermore, to optimize the IoT uplink communication [65]. Various data link layer and network
transmission, devices (e.g., smartphones and vehicles) are layer protocols are presented in section VI and section VII.

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

3) APPLICATION LAYER users and adapts itself to aggregate, process, learn, filter,
It is the top layer in IoT architecture, also known as the and deliver the services.
business layer [11]. Based on the functionality of the layer,  The device should be uniquely identified to globally
it is virtually subdivided into two layers, i.e., service access and control remote multimedia devices based on
sublayer and application sublayer [66]. The service several techniques, i.e., Internet Protocol (IP), Domain
sublayer provides information management, data mining, Name System (DNS), Uniform Resource Identifier
data analytics, and decision-making services. The (URI), and Object Name Sevices (ONS).
application sub-layer needs to provide the required services  Naming the multimedia content to manage huge
to end-user or machines. The application layer primarily multimedia data using Digital objects Identifiers (DOI),
analyzes the required services of IoT application and Digital Item Identification (DII), or Digital Item
transforms the physical world data into the expressions of Declaration (DID).
cyber world demands. Constrained Application Protocol  Data storage and processing are responsible for offering
(CoAP) is proposed by IEEE 802.15.4 standard [67] to massive storage with the scalability, accessibility, and
improve data packets delivery and to reduce overheads. security. Along with stored multimedia, data should be
The messaging layer and request/response layer are two categorized and indexed according to the end-users
defined layers in CoAP. Other proposed IoT application requirement. Multimedia content access requires
layer protocols are Data Distribution Service (DDS), security and privacy policies. Content-Delivery-
Advanced Message Queue Protocol (AMQP), and Network (CDN) is proposed to process multimedia
Extensible Messaging and Presence Protocol (XMPP) [11]. content in a distributed manner to overcome resource
B. M-IoT ARCHITECTURES constraints.
The multi-agent cloud performs data mining and data
The characteristics of IoT make it possible to support analysis, service composition, and content sharing.
multimedia applications. However, it poses enormous Authors have defined agents as autonomous software
challenges as multimedia applications are bandwidth- working independently to achieve objectives subject to
hungry and delay-sensitive. Radio and computational design constraints.
resources are preciously scarce for IoT devices. The rapid Kaeri et al. [68] further enhance the multi-agent M-IoT
surge of multimedia data in IoT leads to vast amorphous architecture to make it more practical by proposing and
data. Researchers have proposed different M-IoT implementing the five-layer architecture. The proposed
architectures to efficiently analyze, process, and utilize the architecture includes a novel concept of modules based
resources with more reliability. Novel M-IoT architectures channel that comprises multimedia device communication,
are presented in this section. Fig. 4 and Table IV M-IoT services, resources, and a resource connector layer.
summarizes existing M-IoT architectures. Service execution agents and applications layer holds the
1) MULTI-AGENT BASED M-IOT ARCHITECTURE upper position in the proposed architecture. Various
Based on the bulky and unstructured nature of the multimedia devices and communication stack form the
multimedia content, researchers in [4] propose a multi- things layer.
agent cloud computing-based architecture for multimedia Multimedia data stream to or from the devices forms M-
communication in IoT. The authors have outlined multiple IoT service of the resource layer. Cloud resource is a
open issues in M-IoT over different communication layers. special type that performs asynchronous communication.
The presented architecture is separated into four main Edge nodes operate on synchronous communication for
parts; Multimedia sensing, reporting and addressability, real-time processing. Resource connector exchanges
multimedia aware cloud, and multi-agent systems. messages to or from
Multimedia sensing is responsible for pre-transmission M-IoT service and resource layer with service execution
processing, which includes transformation, quantization, agents layer which serves modules according to application
estimation, and compression techniques to reduce the requirement. It also provides Application Programming
bandwidth requirements. Interfaces (APIs) for applications. The authors have
In addition, authors have suggested equipping the conducted experiments by implementing their proposed
network with energy harvesting capabilities to balance the architecture in the remote collaboration support system for
tradeoff between feasible compressions and the energy- video conferencing [68].
constrained M-IoT devices. The report and addressability
2) AI-BASED SOFTWARE-DEFINED M-IOT
comprise the abilities of the link-layer enabling ARCHITECTURE
technologies, i.e., IPv6 over Low-Power Wireless Personal The robust increase in multimedia traffic necessitates an
Area Networks (6LoWPAN) based IPv6 Routing Protocol efficient network traffic management system. Rego et al.
for Low-Power and Lossy Networks (RPL), green [69] propose an intelligent network management system
communication, transport, and application layer. The for the IoT video surveillance system based on SDN and
multimedia-aware cloud performs four main jobs that are: Artificial Intelligence (AI). The AI module is integrated
 Multimedia-aware middleware is responsible for into SDN to guarantee the QoS and QoE based on delay,
understanding various requirements/services of the end- loss rate, and jitter. The authors define two main
functionalities for the AI module, i.e., data classification

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

and resource estimation. The SDN controller governs level. The response to the query can be made available on
SDN. After the SDN controller receives the data from IoT social network services. Crowdsensing provides
Network Heads (NHs), the SDN controller sends a request congestion and weather-related statistics. The article
to the AI module to classify the data. Multimedia data is presents a practical implementation of the proposed
classified as critical traffic. The article also highlights the framework and development of smartphone application
preprocessing standards to prioritizes the data set by considering Hajj pilgrims as a massive ad-hoc crowd.
classifying it as critical and label it in increasing order with
4) BIG DATA LAYERED M-IOT ARCHITECTURE
1 being non-critical traffic and 5 being very critical traffic. Authors in [71] proposed a novel concept of six-layered
Various Machine Learning (ML) approaches are compared M-IoT architecture based on big data aggregation,
to train AI traffic classification module to achieve the best computation, and extraction of multimedia content. Instead
performance that is a Support Vector Machine (SVM), of word media authors have considered modal, which
Neural Network (NN), and statistic method (Kernel). refers to the way the data is interpreted to convey meaning.
Bayes statistic model is used for network resource Moreover, they have listed three main problems associated
estimation based on traffic priority, route traffic, with multimodal big data computation that is to compute
bandwidth variation, buffer management, nodes sleeping the huge amount of data, to detect and extract meaningful
duration in the network, and activate backup nodes. Open information and the current limitation of big data
Flow architecture is used to communicate between the processing platforms for multimedia. The six layers
SDN controller and NHs. The authors also propose a proposed in M-IoT architecture are:
customized message protocol for communication between  Identification: Devices are first identified based on their
the SDN controller and the AI module, and NH and IoT object ID that is Electronic Product Codes (EPC) and
nodes. Experiments are conducted using emulator Mininet, Ubiquitous Codes (uCodes). Objects are further
and several results are presented. Results depict 77% discriminately identified based on IPv4 or IPv6. An
accuracy of the AI module. efficient identification technique based on the 6LoWPAN
3) FOG-CLOUD HYBRID M-IOT ARCHITECTURE compression mechanism over IPv6 is presented in [72].
Rahman et al. [70] propose a context-aware fog-cloud  Physical Object: This layer represents the data
hybrid based framework that integrates spatio-temporal aggregated from scalar or multimedia objects based on
multimedia data from IoT mobile and stationary nodes for their modality and passes on the data to the central unit for
the massive ad-hoc crowd. In the article, a three-tier further processing.
architecture: mobile client tier, fog node tier, and remote  Communication: It has the same functionality of link,
cloud tier, is presented. The authors aim to optimize energy network, and transport layer as in traditional IoT
resource utilization and reduce end-to-end delay for the architecture.
massive crowd in the smart city. The mobile client tier  Middleware: It is defined to provide software level
includes service consumers. Fog nodes tier comprises support for functional services that is resource discovery,
smartphones and other IoT fog nodes distributed in the city data management, and non-functional services, which
to assist in real-time processing of spatio-temporal include reliability, scalability, and security.
collective or individual queries. Cloud tier is formed of IP  Multimodal computation: It is responsible for providing
based massive big data architecture to analytical compute, hardware components for computation and Real-Time
store, and process offline queries. BLE, WiFi Direct, 5G, Operating Systems (RTOS). Authors have proposed a sub-
or D2D spectrum can be used for communication within layer for big data analytics, which includes a centralized
the fog tier. Cloud comprises of four different platforms data unit, multimodal data aggregation unit, multimodal
that are the crowdsensing service, social network service, divide and conquers computation unit, and fusion and
mobile or stationary IoT service, and crowdsourcing decision-making unit. These units are specifically designed
service. Smartphone acting as a context manager and fog to aggregate, analyze, process, and extract the desired
node, provides storage, computation, and communication- features from the big multimodal data.
based on an individual's historical context. Thus, it  Application layer: It provides the required services
decreases a large amount of payload to the backend cloud. through a set of standardizing protocols.
The eventual storage and complex analytical computation Moreover, the article presents a unique and efficient
can be pushed to the cloud. User context requirements are technique that is Divide and Conquers Principal
defined according to their subscribed IoT services. Component Analysis (DC-PCA) to reduce the dimensions,
Moreover, semantics is added to the system using the 3A subdivides the data, process the subdivided data in parallel
model which assimilates the data from Body Sensor fashion, and fuse the final parallel processed data to extract
Network (BSN), crowdsourcing, social networks and IoT the features. Thus making the required decision for
devices to a unified, generic context by the smartphone’s services and applications. The practical implementation of
context manager to deduce elevated semantics overlay. the proposed DC-PCA for face recognition application
A query can be responded by one or all four platforms. To using Yale and ORL databases is presented. The authors
find a dust-free path, dust sensors deployed in the city can efficiently presented the functionality of each layer.
provide real-time data, crowdsourcing delivers the query
response, human or mobile IoT sensors provides the dust

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

5) SECURITY BASED ARCHITECTURE applications based on different roles in the smart city.
Zhou et al. [73] devised Mediaware Traffic Security Table V classifies and summarizes the applications of M-
Architecture (MTSA) for M-IoT based on four main IoT.
components. These components are key management
which comprises service control, user control, flow control A. ROAD MANAGEMENT SYSTEM
scalable, and nonscalable schemes [74]. Batch rekeying
accommodates multiple multimedia applications based on 1) TRAFFIC MONITORING:
Efficient traffic monitoring and control is one of the
periodic batch keying, periodic batch leave keying, and
major issues in the smart city. To handle this problem, there
periodic batch join rekeying [75]. Authentication is
are different solutions based on infra-red detectors,
achieved by group authentication, source authentication,
magnetic loops, and microwave radars. These conventional
and individual sender authentication employing access
techniques incur huge installation, maintenance costs, and
control list, ability certificates, and mutual authentication
lack of accuracy. The researcher put forward M-IoT based
methods [76]. Watermarking is used to identify the origin
techniques to effectively detect and identify the volume of
of multimedia content, trace illegal distribution, and block
traffic and predict the reason for a traffic jam. Fig. 5
unauthorized access by embedding a unique watermark
conceptualize the M-IoT to enhance the road management
into multimedia content [77]. The proposed framework
system. Authors in [78] presented computer vision-based
exploits visual secrecy measures to provide generic
ontology-driven context-aware M-IoT architecture to
multimedia security solutions that degrade comparatively
estimate the traffic by tracking the number of vehicles
to the number of shares in possession of an attacker. MTSA
present on the road in real-time from CCTV camera video
inherits content-awareness characteristics from media-
and segregate moving vehicles from stationary vehicles.
aware based middleware security architecture for
Based on the density of stationary traffic that occupies the
multimedia services [76].
road is compared to a threshold value. Multimedia Web
C. SUMMARY AND INSIGHTS Ontology Language (MOWL) has been adopted, which
This section defines IoT and elaborates each layer of utilizes time-varying Dynamic Bayesian Networks (DBN)
traditional IoT architecture. It also covers various for comparison and predicts the cause of traffic congestion.
architectures and the design requirements for M-IoT. Automatic alerts can be triggered by road traffic authorities
Multimedia communication in IoT needs flexible and to avoid a traffic jam. Raspberry Pi and Pi camera-based
interoperable architecture to support HetNET and different IoT architecture are presented in [47] for traffic
multimedia applications with various application surveillance and road accidents. The authors used a
requirements. Multiagent, fog-cloud hybrid, big data, and Gaussian Mixture Model (GMM) with canny edge
multimedia traffic security architectures have been detection on VIRAT and MIT traffic data set to evaluate
investigated in detail. However, quality-aware their proposal. The article also presents several surveyed
architectures and M-IoT computation are presented in the efficient methods, i.e., hidden Markov and neural network,
latter section of the article. The existing work on M-IoT are Lucas-Kanade, and K-means clustering techniques for
mostly focussed on application-dependent requirements, accurate accident detection and vehicle tracking.
and it does not take into the consideration of standardizing Anna et al. [79] proposed an Adaptive Nero Fuzzy
M-IoT architecture. Standardized M-IoT architecture is in Inference System (ANFIS) and image processing based
need to support multimedia content in various IoT technique using M-IoT for the better traffic light
applications. The use of multi-agent base ML algorithms management and monitoring system. Camera images are
can effectively improve the learning and understanding of obtained and analyzed on a ThinkSpeak based cloud
an individual’s multimedia demands in M-IoT architecture. server. Based on the analysis, control actions are given to
This section is summarized in Table IV. traffic lights. Machine vision blob analysis technique is
used to detect and locate the vehicle. Due to poor
III. APPLICATIONS OF M-IoT illumination conditions during night, the Otsu image
Multimedia objects equipped with Internet connectivity processing technique is used. Low Power Wide Area
and interaction with other objects without human Network (LoPWAN) and Long Range (LoRa) receiver and
intervention leads toward the vast opportunities for the transmitters are adapted to propose IoT smart traffic
betterment of humankind in daily life. Since multimedia monitoring and control architecture in [80]. A comparative
data is rich in information. Features like face recognition, survey on the M-IoT based traffic management system is
motion detection, license plate identification, driver presented in [81].
drowsiness indication, patient state, crowd detection, path 2) PATH DETECTION, LANE DETECTION, AND
hole, and obstacle detection, retina scanning for ACCIDENT REPORTING
authorization and crime detection can be extracted Autonomous or Unmanned Ground Vehicles (UGV) are
employing various data aggregation, analytics and the key element in the development of a smart city. Lane
extraction tools. A heterogeneous network of multimedia detection is considered a vital feature to avoid a collision
objects, ubiquitous data transmission, and cloud-based in UGVs. Image-Based obstacle detection and path
multimedia content analytics paved the path for smart planning are discussed in [82], which includes the
cities. In this section, we have classified numerous M-IoT

10

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

ROAD
SMART
TRAFFIC
AMBULANCE
AUTHORITY

Trespassing Detection

VEHICLE DETECTION LONG RANGE CAMERA


MONITORING AND HUMP & PATHOLE SMART TRAFFIC ACCIDENT DETECTION AND
MANAGEMENT DETECTION CONTROL AUTOMATIC REPORTING

LOCATION INTEGERATED IMAGES AND ALERTS 360 VIDEO SURVEILLANCE,


VIDEO RECORDING AUTHORIZATION
TRAFFIC DETECTION,
LIVE STREAMING CONGESTION PREDICTION
TRAFFIC VIOLATION

FIGURE 5. The use case of M-IoT for road management systems that includes accident detection and prevention system ( [47], [83]), traffic
estimation and congestion prevention systems [78], lane and path hole detection ( [82], [84]), trespassing detection [92], automatic
emergency detection and alerts generation systems [87], and traffic signal monitoring system ( [79], [91]).

conversion of video into fixed-rate image frames. Frames of the light when no vehicle is present in the street. Traffic
are then analyzed using image processing techniques, i.e., bollards are used to avoid an accident during red and
edge extraction and thresholding. A cloud-based M-IoT yellow lights. Cameras are deployed for the surveillance
system is proposed for accident prevention in [83]. systems. Latif et al. [92] proposed the smart city model
HoneyBee Optimization (HBO) based IoT road monitoring having intelligent traffic monitoring and guidance system.
system is proposed in [84] to detect humps and pothole to The proposed model incorporates multimedia data for
prevent accidents. A driving algorithm for path planning is authentication, verification, registration, authorization,
proposed for autonomous vehicles exploiting potential shortest path identification, to high light the congested
field methods and lane detection in [85]. Data is acquired areas. Public places like schools, colleges, hospitals, hotels,
using CCD cameras, differential GPS, 2-dimensional laser petrol pumps, and banks are considered as objects and are
scanner, and digital compass. The analysis is performed identified by specific IDs. Cameras are used to monitor the
using the proposed algorithm for lane detection. CDN and flow of traffic. The shortest path is determined based on
MPEG Dynamic Adaptive Streaming over HTTP (DASH) time or distance. Vienna Development Method-
are used for a real-time vehicle monitoring system in [86]. Specification Language (VDM-SL) is opted-in this article
NI et al. [87] present a novel lifesaving concept for the for modeling purposes.
individuals left behind in the vehicle. The article
4) AUTHENTICATION AND CRIME DETECTION
incorporates life recognition, environmental monitoring, IP Multimedia System (IMS) based M2M metropolitan
and alarming subsystem. Vehicle-to-Vehicle (V2V) platform for traffic management to restrict vehicles
communication in M-IoT based on Direct Short-Range entering the prohibited area is detailed in [93]. Authors in
Communication (DSRC) for Intelligent Transport System [94], proposed a Deep Neural Network (DNN) based
(ITS) is proposed in [88]. Several benefits of using the autonomous Taxi model for a smart city. Authors in [95]
multimedia Internet of Vehicle Things (IoVT) for a traffic presented a novel concept of M-IoT based crime detection
management system are identified in [89]. Android-based in a smart city by analyzing human emotions and CCTV
IoT vehicle monitoring system accessing various vehicle videos. After detection and identification of crime, it is
parameters and driver behavior analysis using a Controller stored in the database and visualized using a Geographic
Area Network (CAN) is presented in [90]. Information System (GIS). As the smart city is the set of
3) TRAFFIC LIGHTS MANAGEMENT heterogeneous devices and networks, various network
An efficient, cost-effective traffic and street light control architecture supporting heterogeneity, e.g., Information-
mechanism based on M-IoT is outlined in [91] for smart Driven Architecture (IDRA), participatory sensing in
cities. The solar panel-based streetlights with Direct building the smart city is high lightened in [96]. Automatic
Current (DC) power supply as a backup along with Light toll tax payments are one of the essential features in a smart
Dependent Resistor (LDR) is used to control the intensity

11

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Security and Surveillance


Control for smart
Pacemakers, insulin
home i.e., door locks, Hacked autonomous Confidential
pumps, smart
lighting, voice smart vehicles allows industrial data is
surgery, patients data
assistant and remote control of vulnerable for Biometrics using Multimedia IoT
can be attacked
automaton system brakes and engine personal interests.
remotely
can be vulnerable

FIGURE 6. The use case of M-IoT applications for security and surveillance in a smart city. Existing work in security using multimedia data
mostly includes fingerprint biometrics ( [99]- [101]), voice bio-metrics ( [103], [104]), retina and iris scanning ( [105], [109]), and face
recognition [112]. Multimedia data in IoT is widely used in surveillance systems ( [110]- [126]).

city. Beforehand payments based on source and destination various multimedia devices. Authors have outlined various
location, and authentication based on license plate reading steps for efficient biometric identification, i.e., image
as JavaScript Object Notation (JSON) data are described in acquisition, segmentation, pre-processing, and feature
[97]. A detailed survey on M-IoT based road traffic extraction. Moreover, the article presents insights about
surveillance and accident detection is presented in [98]. different fingerprint acquisition devices, i.e., optical
sensors, capacitive sensors, thermal, artificial fingerprints
B. HABITAT MONITORING generation, ultrasonic, and digital cameras. Several
1) SECURITY AND SURVEILLANCE fingerprint databases are also plotted. The smart objects in
The revolutionary IoT, transforming millions of lives by Industrial-IoT (IIoT) share information on open channels
providing ease in almost every aspect of daily routine, over the Internet that makes confidential industrial plants
could turn into the worst enemy. For example, hackers can vulnerable to an eavesdropper.
hack to intercept every document you print and redirect it Ashok et al. [100] presented the cloud-based Biometric-
to an isolated site. They could have control of your smart Privacy Preserving User Authentication (BP2UA)
TV to bug your home. The smart metering system could be technique. The security analysis of the proposed model is
hacked to control the appliances of the ventilation system conducted using the Oracle-based Real-or-Random (RoR)
of your home. A traffic light management system could be model. Telecare Medical Information System (TMIS) has
controlled to achieve specific tasks. Variation in the been introduced for critical patients to communicate with
pacemaker of your heart could be made to kill. The doctors. An un-registered adversary, i.e., attackers can find
autonomous vehicles could be hacked to control the the loop opportunity to mislead the patient to achieve
braking system for your car. These issues lead to serious specific goals. An efficient, secure smart card based on
threats. biometric and password double authentication procedures
Traditional use of passwords was the authentication for remote authorization is proposed in [101]. H. Hamidi,
system until now. However, the researcher has proposed in [102] presented a secure biometrics-based technique for
various IoT security and surveillance system based on Health IoT (H-IoT).
multimedia data, i.e., retina scanning, biometric scanning, b) VOICE BIO-METRICS
voice recognition, and video surveillance systems to With the growing deployment of smart homes and smart
minimize security loopholes. Enthusiastic researchers have banking applications, i.e., voice to control everything, and
further extended the usage of M-IoT to gain maximum authentication by voice recognition, provide attackers with
advantage in various fields. The following are M-IoT an easy loophole which is one of the vital security
authentications, surveillance, and monitoring application. challenges ahead. Voice biometrics are proposed by
Fig. 6 shows the M-IoT application of security and several researchers stretching up to the verification level of
surveillance for habitat monitoring. the security system. Voiceprint verification system based
a) BIO-METRIC AUTHENTICATION on DL exploiting SVM-Neural Network (SVM-NN) and
Fatimah et al. [99] presented the sketch map leading Mel-Frequency Cepstral Coefficients (MFCC), and feature
towards the Internet of Biometric Things (IoBT) using extraction technique to increase the security for M-IoT

12

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

systems is proposed in [103]. In this work, the LibriSpeech system, industrial surveillance, and other localization-
dataset is utilized for training. Yan et al. [104] present a related features. The immobility of the PC based
novel system based on a voice liveness detection system surveillance system encourages the researcher to propose
that utilizes wireless signals from IoT devices and received IoT based security systems. Multimedia communication
vocal samples for verification of Voice Control User over IoT enables us to achieve this objective. Hasan et al.
Interfaces (VUI) decreasing spoofing attacks. The authors in [110] proposed IoT residential surveillance system. The
named their technique as WiVo. The feasibility and proposed scheme is an Android-based application and
effectiveness of the proposed system are evaluated on the hardware which includes Raspberry Pi, Pi camera, PIR
Samsung SmartThings testbed. The article also listed sensor, and ultrasonic sensors to alert the owner of a house
several attacks on VUI. A comprehensive survey on with an intruder. PIR sensor detects the suspicious
biometric-based IoT security issues, challenges, and movement within the specified range, and the image taken
techniques are presented in [48], [49]. by Pi camera is stored in the memory card. An email or
c) RETINA AUTHENTICATION alert message is sent to the owner by Raspberry Pi.
The researcher further enhances the security level of IoT To detect emergency and generate alerts for the older
using multimedia communication by proposing various person at home, an Android application is designed and
techniques to implement retina scanning and iris implemented based on the Real-Time Stream Protocol
recognition. Kert et al. [105] proposed a probabilistic iris (RTSP) and Real-time Transport Protocol (RTP) [111].
recognition approach using the UPOL database to The video is captured, processed, and encoded using H.264
overcome the PCA technique. HSI and YCbCr color spaces at the server end. Client-end includes smartphones, tablets,
are used to generate the Probability Density Function or PC, can access live streaming using RTSP and video is
(PDF). The KLD tool is used to extract colored eye iris decoded using FFMPEG. Security is further enhanced for
information. Ocular Recognition (OR) for a secure IoT the elderly by face detection feature using OpenCV library
application has been proposed in the literature. for intrusion detection, and critical screenshots are saved
Different OR techniques have been investigated in [106]. for emergency alerts. A natural language processing
An algorithm based on the fusion of iris and retinal interface combined with ontologies and image analysis
scanning is proposed for user authentication in Apple and based video surveillance approach is proposed in [112] for
Andriod devices. Retina based face recognition content-based retrieval of visual data. The proposal aims to
authentication system is presented in [107]. In this article, achieve passenger safety in the public transport system.
retina modeling is improved by accurate truncation Four ontologies are utilized, i.e., DAML time, properties,
adaption, illumination classification, and lighting object, and event. PCA and SVM are used for face
estimation. Yale B database is utilized to validate their detection and gender classification. Sphinx is used for
model. Ocular maladies damage the vascular patterns and audio mapping with semantics formed by ontology
create abnormalities in the retina, which hinders the vocabularies.
accurate recognition for authentication. Researchers in Infants baby monitoring system for the detection of
[108], proposed an efficient vascular recognition technique sudden infant death syndrome (SIDS) is presented in [113].
to overcome the effects caused by lesions and to extract A video camera exploiting the Eulerian motion
region-based features from retina images. Gabor Wavelet magnification technique developed by MIT to monitor and
is utilized for noise reduction and pre-processing, followed detect infant chest motion during breathing is proposed.
by segmentation. Blood vessel validation is performed to When an emergency is identified, an alert message is sent
eliminate false detection by a 5-D feature extraction to a parent’s smartphone via Twilio, which is a cloud-based
algorithm and classification based on SVM. The database communication platform [113]. Video summarization to
is formed by 5-D extracted features. Finally, authentication reduce the search time from big multimedia data generated
is performed with the created database. Zongqiang et al. by the surveillance system and content image-based
[109] proposed an improved Iris localization authentication retrieval techniques for smart surveillance is detailed in
method. The authors modeled the system by first [114]. Aggregated Channel Feature (ACF) extraction and
evaluating the quality of the image taken according to the bounding box approach for moving objects are used, and
image intensity, clarity, and integrity. The clarity of the the cost is determined if any critical situation is observed.
image is evaluated by using a block-variance method, and Image with a high-cost box is summarized and utilized for
integrity is defined on the location of the pupil, i.e., the video retrieval on search, which reduces the time, memory,
pupil must be in the center. The algorithm works by and computation requirements of the system. Shih et al.
estimating the range of center, radius of the pupil, and pupil [115] proposed a multi-view video summarization method
region extraction, thus reducing the delay in iris to address the high bandwidth transmission requirement for
recognition. the Internet of Video Things (IoVT). The proposed scheme
d) SURVEILLANCE FOR PUBLIC SAFETY is based on the K-Nearest Neighbour (KNN) model. The
With the increasing deployment of IoT in our daily life performance evaluation is measured by making a
and decline in the implementation costs, video surveillance comparison with the GMM based summarization model
systems became a key requirement for the smart city to based on precision metrics, i.e., removal of redundant data,
ensure public safety for crime detection, home security and the security of critical information. An online multi-

13

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

view summarization algorithm and RPi based distributed presents an SDN based network selection approach to
video summarization sensor node is developed in [116] and maintain QoC in HetNet. The proposed approach selects
[117]. between the licensed band (LTE) or unlicensed (WiFi) for
Mohammed et al. [118] presented a secure framework real-time services. The data aggregated at the sensor is
for Mobile Video Surveillance Systems (MVSS) by transmitted to the edge processor over upstream links, i.e.,
considering a key management system to secure channels LTE and WiFi. The Edge processor evaluates the received
between all the entities, i.e., camera, Mobile Edge packets according to the data path and computational goals,
Computing (MEC), MEC to MEC, and MEC to cloud. An and feedback is sent on a reverse path. Elias et al. [126]
optimized spectrum utilization scheme for video streaming proposed a novel concept of using quadrotors for IoT real-
in environment monitoring by automatic Transport Block time automatic tracking applications.
Size (TBS) index selection using narrow-band Beyond 4G
(B4G) is proposed in [119]. Video-based Indoor C. MULTIMEDIA IoT IN INDUSTRIAL APPLICATIONS
Positioning System (VIPS) estimating the precise face 1) SMART INDUSTRY
detection of each individual with centimeter grade IIoT is the main component of the smart industry,
accuracy is presented in [120]. The prototype comprises enhancing product manufacturing, and optimizing the
two units, i.e., an Indoor Positioning System (IPS) and industrial process. Multimedia characteristics further
Mobile Handled Unit (MHU). IPS is responsible for enhance the outcome of the industrial process, as shown in
capturing the frame of individuals approaching an area, the Fig. 7a. The steel industry is known as the backbone of any
face is detected for all individuals and mapped to the area nation. The steel industry modernizes civilization by
location, after which the positioning information is playing a lead role in technology development. Steel
broadcasted to MHU which compares the individual manufacturing is performed at high temperature. Therefore
information in its database with the received information. track identification is challenging under such
Nan et al. [121] proposed an efficient video compression circumstances. Automatic depth-based vision feature
and encoding/decoding technique for wireless multiview extraction and track identification in steel billet to maintain
video streaming applications in IoT to enhance the energy the quality of steel products in a smart industry by M-IoT
efficiency of the system. The researcher in [122] presents is proposed in [127]. Online images are taken once steel
the concept of distributed edge computing to minimize the billets are manufactured. Features are extracted using
video processing load at the cloud for real-time wireless Local Binary Pattern (LBP) and stored in a database with
multiview surveillance systems. Authors name this identification codes. The framework for 3D surface
approach as Vigil, a camera with Edge Computing Node inspection of steel billets is presented in [128]. 3D scanning
(ECN), which priorities the video frames from multi- is performed using a camera by continuously capturing
camera deployed in the same region for multiview and multiple images, and green-line lasers are utilized to
intelligently schedule them for efficient resource extract the depth information of steel billets to inspect the
utilization. It also provides a user input interface for a object from various angles in the smart industry.
specific query. Condition Monitoring (CM) system based on M-IoT is
Slicing and parallel processing approaches to efficiently defined in [129]. It detects defective machines to prevent
handle the bulky nature of IoVT are proposed in [123]. production outage and reduce the operational cost in the
sTune architecture is followed in this approach, in which a oil-gas petroleum industry. Thermal and gas turbine power
metadata manager manages several cloud storage plants are the biggest assets of the nation. Flame color
endpoints. The processing unit is composed of a master video recording and images are analyzed to optimize air to
node and several slave nodes. The master node is capable fuel ratio that ensures combustion quality. K. Sujatha et al.
of retrieving data from sTune and assigns the slave nodes [130] proposed Fishers Linear Discriminant (FLD)
to process the sliced video data in parallel. After processing analysis technique for dimension reduction and
master nodes stores the processed data back to the cloud. classification. An Artificial Neural Network (ANN) based
CPU and memory usage are considered as performance on Back-Propagation Algorithm (BPA) and Ant Colony
metrics to evaluate the performance. A multimedia Optimization (ACO) for feature extraction from flame
application requesting the same content from M-IoT is images and videos are utilized to maintain the combustion
delivered separately over the core network that increases quality. An automatic industrial meter reading device
the overhead. To cope with this issue, Helber et al. [124] based on online Optical Character Recognition (OCR) is
propose SCORPIO, an SDN control plane to provide designed in [131]. After extracting readings of various
multimedia multipart transport services to duplicate the industrial meters from images, the device logged the
multimedia packets at the edge of the network and map readings to the cloud. At the cloud, data is processed and
them with the applications of common interest in the data made centrally available to authorized users on PC,
plane path. The performance metrics to evaluate the smartphones, and laptops. The proposed smart device
proposed methodology are throughput, jitter, and packet improves time utilization by reducing human intervention.
dropping ratio. Solar-powered grid estimation employing sky camera
Quality of Computing (QoC) is introduced in [125] to based on Energy Harvesting Wireless Sensor Networks
determine the occupancy of the network. The article (EHWSN) is presented in [132]. Authors in this article

14

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

(a)
MIoT In 3D Modelling Surface
Inspection Of Steel Billets
Track Identification During Steel
Manufacturing Using MIoT
Condition Monitoring To Detect
Defective Machines
Online Optimal Character
Recognition For Industrial Meter
Reading
Wireless Communication
BLE, Zigbee, Sigfox, LoRa

(b)
MIoT In Automatic Irrigation
System Using Wireless Camera
MIoT In Automatic Infected
Crop Detection
MIoT In Future Crop Harvest
Prediction To Maintain Supply &
Demand
Dynamic Data Analysis Of Crop
Growth And Food Recognition
System
Image Recognition System To
Determine Food Freshness
MIoT To Detect Animals
Intrusion

FIGURE 7. The use case of M-IoT in industrial and agricultural applications. (a) Multimedia data flow in industrial IoT for inspection of steel
manufacturing ( [127]- [128]), combustion quality maintenance [130], and industrial meter reading [131]. (b) Agricultural application of M-
IoT for crop monitoring for production control ( [136]- [141]).

maximize the transmission quality of sky camera images image classification is performed using the Orange Pi
and minimize the energy consumption of multimedia data hardware platform. CvCanny library is utilized in this work
transmission by determining the best forward relay path. for object edge detection to track the path inside the
2) SMART MUSEUM warehouse facility.
Preservation of culture is essential for our future generation 3) SMART AGRICULTURE
to establish and strengthen their identity. The Museum Agriculture is another important industrial sector.
industry plays a critical role in preserving cultural heritage Researchers are trying to revolutionize the agriculture
and displaying knowledge about it. It is the primary source sector to increase its productivity by incorporating M-IoT
of promoting tourism and improves economics statistics. (See Fig. 7b). Nisha et al. [136] present automatic
Smart Museum is the need for a smart environment to irrigation and an infected area monitoring system using a
inspire tourists from all over the world. A smart device is wireless camera in the crop field to aid farmers. Zigbee
proposed in [133] to gather localization information of the transceiver is deployed to incorporate low power Zigbee
visitor using BLE. It automatically provides the over IEEE 802.15.4 protocol for communication and
information related to art in front of it using image managing sensors data. K-means clustering machine
processing and stores it to the cloud to be accessible on algorithm is used for the detection of disease, color
smart devices. Foreground detection and background determination, and pest detection. Agricultural production
subtraction are utilized in the proposed work for extraction framework to monitor and predicts the future harvest of
and image processing. crops to maintain balance in supply and demand is
To manage the huge historical data and enhance the proposed in [137]. The software-based visual general user
guiding system for tourist in a smart Museum, M-IoT interface is implemented, and live streaming of the field
beacon devices based on Raspberry Pi for content delivery crop is obtained by deploying a wireless camera. Dynamic
operating on BLE is proposed in [134]. The researcher data analysis for crop growth management system using
further takes M-IoT benefits by implementing computer IoT is proposed in [138]. The dynamic system equips the
vision-based image recognition transport robots for an farmer with the historically analyzed data on a smartphone
automated warehouse in [135]. Neural network-based

15

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

while moving in the field by communicating with the condition. The system is evaluated in the context of packet
nearest deployed sensor node. An efficient low power delivery ratio, end-to-end delay, and duty cycles.
MAC-based WSN working in a dynamic duty cycle Authors in [139] present a detailed study of various IoT
scheme is presented in work to resolve the congestion agricultural crop monitoring systems. Android-based food

TABLE V
APPLICATIONS OF WIRELESS MULTIMEDIA COMMUNICATION IN IOT
Different Applications Proposed Methodology Articles Year
Image Processing based Ontology-Driven Context-Aware [78] 2017
Multimedia based Smart Traffic Light [79] 2018
Image and Video based Smart Traffic Monitoring [80] 2017
Traffic Monitoring Review on Traffic Management [81] 2018
Cloud Proceesing for Mobile Multimedia-Based Traffic Monitoring [83] 2018
Road Management System

IoV for Traffic management [89] 2017


M2M Based Multimedia Traffic Management [93] 2011
Image-based Obstacle Detection [82] 2016
A Survey on Road Traffic Surveillance and Accident Detection [98] 2017
Humps and Pothole Detection using [84] 2018
Multimedia based Path Detection, Lane UAV Path Planning [85] 2010
Detection and Accident Reporting Vehicle Monitoring System [86] 2018
Life Monitoring in Vehicle [87] 2018
V2V Communication [88] 2016
Android IoT Based Vehicle Monitoring [90] 2018
Image and Video based Traffic Lights Street Lights management [91] 2017
Management Guidance System for Smart City [92] 2018
Autonomous Taxi for Smart City [94] 2018
Multimedia based Authentication and Crime Detection [95] 2014
Crime Detection Network Architectures for Smart City [96] 2012
IoT Based Toll Payment [97] 2016
Internet of Biometric Things [99] 2016
Bio-Metric Biometric Authentication for IIoT [100] 2018
Authentication Biometric Secure Telecare System [101] 2014
Voice Biometrics [103] 2017
Voice Bio- Voice User Interface Security [104] 2018
Metrics Secure H-IoT [102] 2019
Biometric IoT Security-Comprehensive Survey [48], [49] 2015-18
Retina Authentication [105] 2015
Iris and Retina Fusion Scanning For M-IoT [106] 2018
Retina Face Recognition using Retina Scan [107] 2014
Authentication
Habitat Monitoring

Diminishing Effect of Ocular Diseases [108] 2015


Iris Localization Authentication Method [109] 2011
Pi camera based M-IoT Surveillance System [110] 2018
RTP and RTSP based Android Surveillance [111] 2015
Security
Speech with Ontology Driven Public Transport Surveillance System [112] 2009
Surveillance Infants Monitoring System for SIDS Prevention [113] 2017
Video Summarization for Smart Surveillance [114] 2017
KNN Based Multi-view Video Summarization for IoVT [115] 2017
Distributed Video Summarization in IoVT [116], [117] 2015
Secure MVSS in M-IoT [118] 2018
Surveillance
Automatic TBS Selection for Video Transmission in Environmental
System [119] 2016
Monitoring
VIPS for M-IoT Surveillance System [120] 2017
Multiview Video Compressive Encoding/Decoding for M-IoT [121] 2017
Vigil Edge Computing Node for Video Surveillance [122] 2015
Slicing and Parallel Processing in IoVT, an application of M-IoT [123] 2014
SCORPIO a SDN Based Multipart Transport Mechanism in M-IoT [124] 2016
SDN Based Network Selection Algorithm for Real-Time Services [125] 2017
Quadrotors Based IoT Tracking Application [126] 2016
Automatic Vision Depth Based Steel Billets Inspection [127] 2018
3D Modeling Based Steel Billets Inspection [128] 2017
Condition Monitoring for Petroleum Industry [129] 2018
M-IoT Industrial Monitoring Online Flame Color Analysis for Combustion Quality Maintenance [130] 2017
Smart Industry

Optical Character Recognized Meter Reader [131] 2016


Energy Harvested Sky Camera for Smart Grids [132] 2013
Smart Museum Industry using M-IoT [133] 2017
Image Processing Based Smart Museum Smart Museum using Beacon Based Content Delivery [134] 2017
Application of M-IoT for Transport Robots in Automated Warehouse [135] 2018
M-IoT based Agriculture Crop Monitoring [136] 2014
Agricultural Production System using M-IoT [137] 2013
M-IoT in Smart Agriculture Crop Growth Monitoring System using M-IoT [138] 2012
Food Recognition Application of M-IoT [140] 2014
Food Freshness Recognition using Image Processing in M-IoT [141] 2018
Personal Health Multimedia Architecture [142] 2018
M2M Communication Architecture for E-Health Wearable Devices [143] 2018
Cloud of Things for Remote Health Care [144] 2016
E-Health

5G Small Cell Network for Smart Ambulance [145] 2018


Robotic Ambulance for Sudden Cardiac Arrest [146] 2016
Health Monitoring using Multimedia X-ray Images for Robotic Fracture Surgery [147] 2017
Robotic Surgery Assistant [148] 2017
M-IoT for Biomedical Training [149] 2017
Smartphone Retinal Cataract Detection [150] 2015
Smart Ocular Disease Detection [151] 2016

16

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Health features
Extraction
Multi-feature Data
Storage
mapping Analytics

Multimedia data i.e., X-


rays, MRI, E-Surgery
(Images & Video)

Real time patient monitoring


applications & web access.
Real time surgeon s training Autonomous Ambulance
application.

FIGURE 8. The use case of M-IoT for Health. The existing work of M-IoT for smart health includes remotely personal health monitoring ( [142]-
[144]), robotic ambulance [146], X-ray for robotic surgery ( [147]- [148]), biomedical training for surgeons [149] and ocular diseases detection
using smartphones [150], [151]. All these applications could be integrated using cloud service to be available for online and offline access.

recognition application to automatically recommend a provided details of various QoS driven Cloud of Things
cooking recipe is presented in [140]. The proposed work (CoT) based data processing for remote health
employs Speeded-Up Robust Features (SURF) with the applications. Rehman et al. [145] proposed 5G small cell
Hessian detector to extract 144 64-dimension features, network deployment in an ambulance for efficient uplink
Bag-of-Features (BoF) for feature representation technique medical video streaming to enhance the medical QoS (m-
and SVM as a classifier. The proposed scheme gives 84% QoS). Ultrasound video is considered as uplink traffic.
of the recognition rate. Witjaksono et al. in [141] exploits Medical QoS performance is analyzed on the basis of
IoT based application for images recognition to determine throughput, delay, and Packet Loss Ratio (PLR). Results
the freshness of the food. The application also depict that implementing small cell networks augments the
discriminates halal meat from non-halal meat for Muslims. performance of the system. However, improvements are
still required for deploying remote medical health systems
D. HEALTH MONITORING as packets drop in critical medical condition is not
Multimedia data provides the medium to communicate, tolerable.
monitor, and cooperate with various aspects of daily life at Sudden cardiac arrest is a heart condition in which heart
numerous levels of granularity across various applications, stops due to lack of oxygen leading to death if immediate
which in terms of health is known as personal health media. Automated External Defibrillator (AED) is not given. AED
Incorporating personal health media in one device to is a small device for untrained or minimal trained personnel
measure everything using IoT is the features of the future to use it until the first aid arrives. Samani et al. [146]
health system, as shown in Fig. 8. For this purpose, highly designed an intelligent robotic ambulance named
elaborative personal health data features are required. AmbuBot to provide AED to save a life. AmbuBot is
Susanne et al. [142] presented a logical device layer-based equipped with a GSM module for remote connectivity and
architecture for mapping multimedia signals from various high-resolution cameras for Lane Keeping System (LKS)
devices to the smallest elaborative unit named as primary to track lanes and prevent accidents. The system can be
health feature. Mapping is also performed to fuse multiple further extended for multiple conditions, body sensors, and
features and deploy advanced analytics to gain minor multiple robots for collaborative work. Robot-Assisted
health details. Fracture Surgery (RAFS) is revolutionizing the medical
Zafra et al. [143] addressed the issue of coexistence health care by reducing infection risk during surgery and
wearable devices for e-health with traditional three-layered perfectly manipulate each bone fragment into the perfect
IoT architecture and proposed a pervasive layered position. The coordination system is in need between the
architecture to integrate M2M communication between e- detected bone track and an external robotic tool to exact
health wearable and IoT devices. Tejal et al. [144] position the broken bone. Automatic tool detection for
highlight the challenges in analyzing big data generated surgery assistance based on computer vision X-ray images
from remote health monitoring and decision making by is proposed in [147]. Block detection, geometric model
comparison with the patient’s history. The authors also matching, and principal component analysis are utilized to

17

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Performance Metrics for M-IoT


Network

Quality of Quality of
Service (QoS) Experience (QoE)

Mean Opinion
Packet Loss Rate, Score (MOS)
Data Rate, [155],[156],
Throughput [157],[162]
Self Driving Car
[169], [172]

Degradation Mean
Bandwidth Opinion Score
Allocation, Route (DMOS)
Selection [163]
[168]

User Satisfaction
Jitter, Delay, (US)
Resource [161]
management
[170], [173], [175]
Machine-to-Human, Human-to-Machine
Machine-to-Machine Communication
Communication

FIGURE 9. The classification of performance metrics for M-IoT network. The existing work on quality can be studied based on the objective-
based QoS metrics or subjective-based QoE metrics.

achieve a 91% success rate. The robotic arm can extend the E. SUMMARY AND INSIGHTS
perfection provided by 3D positioning. Smartphone
controlled Raspberry Pi based robotic arm is designed to This section covers the wireless multimedia delay-
assist the doctor in surgery [148]. The platform offers built- sensitive applications supported by IoT. Feature extraction
in compatibility of WiFi, camera and other sensors. from audio, video, and images are studied in detail for
Surgical skills and effectiveness directly affect the different applications in security surveillance, traffic,
patient’s health. To minimize the harm to the patient, health, and industry monitoring. Various proposed
surgeons should be highly trained with subjective skills. To methods for biometric authentication to enhance security
overcome this problem, research scientists, along with the systems are highlighted. Multimedia data in optimizing the
medical Doctors in [149] have designed a biomedical IoT performance of the industrial process is also detailed in this
data extraction technique to train surgeons and provide section. The existing M-IoT applications are more focused
real-time feedback on their skills efficiently. The proposed on feature extraction, mapping, and analysis of multimedia
biomedical trainer architecture comprises virtual images, data. However, mobility has not been considered in the M-
medical images, patients data, and journal data. The IoT network for the successful transmission of the delay-
performance of the surgeon is evaluated by capturing the sensitive real-time application. Table V classifies the
surgeon’s technique, visualizing the data, and comparison existing work on M-IoT applications and summarizes this
with the benchmark. section.
Multimedia data features in IoT further benefits the field
of medical health by retinal cataract detection technique for IV. PERFORMANCE METRICS FOR M-IoT
remote area patients. To achieve this, authors in [150] As compared to traditional IoT, multimedia services are
proposed a design to implement a microscopic lens over a gaining admiration in IoT. Multimedia services are delay-
low-cost smartphone camera and real-time detection by sensitive and require efficient network models to maintain
FeedForward Neural Network (FFNN) trained the quality. The bulky nature of multimedia data increases the
algorithm. Yin et al. [151] enhance the system to detect challenges to satisfy the network end-user. User-centric
multiple ocular diseases. The proposed automatic and network-centric metrics can assess quality. QoS can be
architecture includes retinal images of data acquisition determined by network-centric metrics, while user-centric
using a fundus camera. Cloud platform stores patient metrics estimate QoE. QoE symbolizes the user
history, process, analyze and extract features of stored perspective of QoS, i.e., measurement of the overall
images. The reports are generated after analysis, and performance of service or network to evaluate delay-
corresponding ophthalmologists are referred. The sensitive traffic. QoE is further influenced by two factors,
proposed methodology aims to reduce the workload on i.e., objective and subjective factors. The subjective QoE is
medical specialists and save time. measured from experience evaluated by humans, which is
problematic to measure. The objective QoE data includes

18

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

TABLE VI quantify user experiences per service. Various factors


PERFORMANCE METRICS FOR M-IOT FRAMEWORKS affecting QoE has been presented in the article. Bandwidth
Quality Optimization allocation, jitter, and best route selection are considered as
Articles
Performance Metrics for M-IoT

Metrics objective metrics. Two-layered NN based framework is


Quality of QoE Definition [153], [154] presented to map the subjective MOS value with objective
Experience [155], [156], metrics. The optimization problem is formulated to
MOS
(QoE)
Frameworks

[157], [162]
US [161]
optimize QoE by first selecting the best route and then
DMOS [163] assigning the required bandwidth for the selected route.
QoS Definition [165], [166] Alessandro et al. in [156] and [157] proposed virtual
Quality of
Bandwidth [168] layered based QoE-aware architecture. The term Quality of
PLR, delay, Data (QoD) is introduced to evaluate the quality or
Service [169], [172]
Throughput
(QoS)
Resource Management [170]
precision of acquired data by M-IoT devices, and QoS
Energy Conservation [173], [175] parameters are considered as influencing factors for QoD.
QoE-aware framework for smart surveillance and vehicle
network-related manageable and quantifiable parameters. monitoring system has been presented. The authors
Multimedia content over IoT can be evaluated through adopted MOS for numerically measuring QoE.
subjective QoE metrics such as Mean Opinion Score Amulya et al. [158] defined the term QoE and QoS in the
(MOS), Degradation Means Opinion Score (DMOS), and rapport of M2H, H2H, H2H, and M2M. In the case of
user satisfaction [152]. MOS is quantified by rating a user’s humans as the recipient of the multimedia services, the
experience in the range from 1 to 5, where 5 represents the performance of the service is evaluated as QoE, otherwise,
best experience and 1 as bad. Each MOS rating when a receiver is a machine, then the concept of QoT is
corresponds to a solo M-IoT service/session/application utilized. QoT is defined as the acceptable quality to satisfy
required by one or set of users and delivered by only one or complete a service session successfully. The bandwidth
multimedia application. In DMOS, users are asked to utilization is optimized by considering the minimum
quantify the degradation of the services as 1 being very bandwidth at an acceptable level to meet the minimum
annoying to 5 as degradation is inaudible. User requirement of an application. Results depict that the
engagement or satisfaction method can be adopted only requirement for QoE is greater than QoT. The system can
when the user interacts with the application, i.e., video be further enhanced by utilizing ML approach to allocate
playtime, or several likes, and views. In the case of M2M minimum bandwidth as required to maintain QoT.
communication, where the recipient of the application is a Yasuhiro et al. [159] proposed M-IoT framework to
machine, the performance is evaluated by QoS. QoE and evaluate QoE based on physical metrics and metaphysical
QoS perspective related to M-IoT architectures and metrics. The metaphysical metric is proposed to understand
optimization metrics are studied and detailed. Fig. 9 shows the user’s quality and service requirement, which varies
classification of QoS and QoE metrics to evaluate network with applications and model them with available physical
and application quality. The elucidation of each study metrics to achieve desired QoE. However, this work lacks
concerning QoE and QoS has been presented in the subjective experiments and qualitative modeling.
following subsections (See Table VI). SDN and Network Function Virtualization (NFV) based
QoE optimization for adaptive video streaming
A. QUALITY OF EXPERIENCE (QoE) AWARE applications is proposed in [160]. Video streaming
ARCHITECTURES comprises four main tasks, i.e., caching, encoding,
According to Qualinet White Paper [153], QoE is forwarding, and playing back. Node selection for best-path
defined as “QoE is the degree of delight or annoyance of selection is defined as the objective function subject to the
the user of an application or service. It results from the constrained node in terms of resources. The proposed
fulfillment of his or her expectations concerning the utility model is evaluated on Mininet a network emulator and
and enjoyment of the application or service in the light of OpenDaylight as an SDN controller. Performance
the user’s personality and current state.” evaluation of the model is studied based on end-to-end
International telecommunication union (ITU) defines delay, packet loss, and user’s QoE. Shaun et al. [161]
QoE in ITU-T Rec. P.10 [154] as follows: “The overall studied the effect of interference between Non-Orthogonal
acceptability of an application or service, as perceived Multiple Access (NOMA) UE’s on QoE at the consumer
subjectively by the end-user.” Subjective and objective end. Authors utilize the user satisfaction method, i.e.,
QoE data of the M-IoT network is mostly acquired and several clicks or playtime to quantify QoE and formulated
evaluated separately. The fusion of the subjective QoE Cournot competition Oligopoly game problem to optimize
data, i.e., user’s experience rating with the objective QoE power allocation among NOMA UE’s to upload the
data, i.e., bandwidth allocation, route selection, etc., is acquired real-time video surveillance data to the BS with
important to optimize the system. Xiaohong et al. in [155] minimum interference and maintain QoE.
proposed a novel NN based self-learning self-updating Statistical learning, prediction, and automatic network
framework to fuse QoE subjective and objective metrics resource management mechanism to optimize multimedia
named as QoEDF. MOS is adopted in this framework to QoE has been presented in [162]. By statistical monitoring,

19

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

the QoE is predicted, computed and managed by evaluating gateways. Aazam et al. [170] proposed a fog resource
objective network metrics, i.e., jitter, packet loss rate, estimation and utilization to improve QoS based on service
frame rate, frame resolution, data rate, codec, and data Relinquish Rate (RR) and previous Net Promoter Score
volume. MOS has been utilized for QoE. The mobile node (NPS). Resources are managed according to past Service
frequently switching network has been tested for the Level Agreement (SLA) or disagreements. Fog
proposed model. Ahmad et al. [163] presented a multi- computation enhances the performance of the system
dimensional passive QoE monitoring approach at the user model by equipping the devices to estimate and utilize
terminal based on quality degradation, where the probes at resources more efficiently.
UE becomes online when quality is degraded below a Quality-aware Universal Communication Framework
specific threshold. The analyzed data at UE will be sent to (UCF) to handle mobile connectivity and reduce signaling
the service provider to take critical actions to overcome the overheads repeatedly between end devices for M2M
degradation. The proposed system could be improved by communication has been presented in [171]. Network QoS
the implementation of cloud-based QoE analysis and parameters have been analyzed in [172] to evaluate to
monitoring. Wang W. and Wang Q. in [164] introduce a satisfy QoE for IoVT at various network conditions. QoS-
novel concept of Smart Media Pricing (SMP) by aware framework for the Narrow-Band Internet of Things
implementing Price as a Resource (PaaR) instead of smart (NB-IoT) network by utilizing a Partial Observable
data pricing. The authors have proposed to price the end- Markov Decision Process (POMDP) to optimize energy
user according to its required QoE as the criticality of a consumption is outlined in [173]. To conserve energy,
self-driving car is higher to ensure the QoE due to high data Poison distribution in POMDP is used to estimate traffic
rate requirement for precision than the telepresence of a arrival rates and adopt dynamic network configuration
user in which bandwidth requirements are low. Premium changes according to future traffic prediction. The
quality content should be priced higher than an economy proposed model conserves power for BS and UE.
class user. Implementation of various optimization problems and ML
algorithms to predict traffic arrival can further improve the
B. QUALITY OF SERVICE (QOS) AWARE system. Web Real-Time Communication (WebRTC) for
ARCHITECTURE video conferencing in connection with cloud computation
The quality of telecommunication services is defined by has been studied in [174]. The proposed model analyzes
ITU in recommendation ITU-T E.800 [165] as: “Totality QoS parameters in comparison with WebRTC in
of characteristics of a telecommunications service that connection with local networks. Traffic load and the
bear on its ability to satisfy stated and implied needs of the computational delay has been considered as QoS metrics
user of the service.” Microsoft defines network QoS in for analysis. Elhammouti et al. [175] form a game theory
[166] technical white paper as: “Network QoS refers to the problem named satisfaction equilibrium with an objective
ability of the network to handle this traffic such that it function to optimize energy instead of maximizing QoS.
meets the service needs of certain applications.” The authors have highlighted key motivation for
A framework to assess the quality of stereoscopic images optimizing energy subject to achieve satisfactory QoS
for 3D product modeling in M-IoT has been presented in constraint. Several applications related to multimedia have
[167]. The authors proposed a blind image Deep Belief specific data rate requirements, therefore maximizing the
Network (DBN) based on natural science feature extraction QoS above that level will waste the energy. The energy
and Support Vector Regression (SVR) for training. More management can be further enhanced by allocating power
effective machine and Deep Learning (DL) algorithms based on the intrinsic requirement of the application.
could be adopted to reduce the image distortions.
C. SUMMARY AND INSIGHT
Bellavista et al. in [168] proposed an SDN controller based
Fibre optics-Wireless (FiWi) and edge M-IoT hybrid In this section, work related to the quality of the M-IoT
network architecture to optimize QoS in HetNet. Resource network in terms of network performance has been
allocation, i.e., bandwidth, is considered as QoS discussed in detail. Quality of network is further evaluated
optimization metrics. FiWi and Edge M-IoT hybrid in terms of a subjective measure of user experience, which
network enhance the performance by communicating via is QoE and performance of network parameters, i.e., QoS.
the SDN controller. Reserved and excess bandwidth are Various QoE-aware and QoS-aware frameworks have been
offered by FiWi network to edge network in case of discussed. Issues and further enhancements in these works
spontaneous network addition at consumer end via SDN are highlighted. The Key Performance Indicators (KPIs) of
heads. SDN based HetNets integration offers better communication are network metrics. Due to the scarcity of
network management. the network’s bandwidth, bandwidth utilization is one of
Statistical QoS metrics analysis of HetNets gateway is the major KPI. As multimedia data consume a huge amount
studied in [169] for betterment in M-IoT network of bandwidth therefore researchers are considering
designing. PLR, throughput, and delay are considered as exploiting un-utilized wideband available in Terahertz
QoS data. Results show that delay is the same for all types (THz) band i.e., 30-300 GHz that can loosen the strict
of devices. However, PLR and throughput affect more on limitations on bandwidth utilization. However, several
low data rate gateways as compared to high data rate issues related to human exposure index due to high

20

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Multimedia Computing in IoT

Compression and Fog/Edge Software Defined


Event Processing Cloud Computing Networks for M-IoT
Encoding Computing
[190-194] [195-206] Computing
[45], [179-189] [213-224] [225-237]

FIGURE 10. Classification of M-IoT computing. The existing work on multimedia computing can be studied based on compression and
encoding, event detection and processing, cloud computing, fog/edge computing, and SDNs for computing.

penetration power, antenna designing, resource allocation, computationally powered constrained M-IoT devices.
physical and MAC designing are open for research. Traditionally video encoding/compression is achieved by
Studies related to QoS and QoE are highlighted in Table utilizing spatial and temporal redundancies.
VI. The techniques for multimedia encoding are known as
High-Efficiency Video Coding (HEVC) jointly developed
V. M-IoT COMPUTING PARADIGM by ITU-T and International Organization for
Standardization (ISO). The current standard jointly
A significant increase in multimedia big data generated
designed in 2013 is H.265, which shows efficient
from IoT devices, this volume increases with diminishing
performance as compared to H.264 developed in 2003
size and mobile nature of IoT devices. The amount of data
[179]. The major features of H.265 include maximum
generated is expected to be 600 Zettabytes (ZB) annually
block size of 64 x 64, adaptive block sub splitting and
by 2020 [176]. One of the particular multimedia IoT data
prediction, and up to thirty-five intra-frame prediction
generated online is audio, video, images, and graphics
directions. Google developed VP9 and DAALA is
[177]. The characteristics of multimedia data are specified
designed by Mozilla Corporation, both compete with
as huge volume, structured and unstructured data, velocity,
H.264 [180]. Comparative analysis of H.264, H.265, VP9,
unpredictability (frequently changing), and accuracy [178].
and DAALA has been presented in [181]. Results depict
The current IoT frameworks to analyze and process scalar
that H.265 outperforms other encoding techniques. Liu et
data are unsuitable for multimedia data in IoT. Multimedia
al. [182] devised a computation complexity reduction
data in IoT poses challenges including storage and sharing,
transcoder solution for real-time video communication.
real-time computation, processing and provision, energy
After mapping the relationship among H.264/AAVC
optimization, resource allocation, feature extraction from
decoding information, the Coding Unit (CU), and the
unstructured multimedia data, addressing and routing,
Prediction Unit (PU) decision process, the proposed model
QoS and QoE preservation, delay sensitivity, data
exploits SVM to classify either to select PU decision mode
reduction, compression and encryption, security and
or CU depth decision process. The objective of the
privacy [177]. Previously we have discussed M-IoT
algorithm is to optimize the interframe prediction process
architectures, use cases, QoS, and QoE optimization
of the HEVC re-encoder. Energy consumption can be
techniques. In this section, various computation,
significantly minimized by applying compression
processing, compression techniques have been discussed.
techniques to avoid energy transmission costs. Santos et al.
Fig. 10 shows the classification of multimedia computing
[183] proposed a truncation based compression technique
in IoT. Routing and resource allocation MAC approaches
named ScaleRelativeMax based on Energy Packing
are present in the later sections. Four main phases of
Efficiency (EPC) for sensitive biomedical applications. For
multimedia data computation are shown in Fig. 11. A
a biomedical application, the reconstruction of the signal
detailed survey on multimedia big data computing in IoT
without losses is of great importance. The impact of
is presented by Kumari et al. [45]. The authors have
different truncation strategies on the Compression Ratio
discussed in detail the difference between big data and big
(CR) has been discussed in detail and compared with the
multimedia data. This section has been specifically
proposed strategy. Results illustrate that the proposed
subdivided into multimedia data compression and event
technique offers linear reconstruction growth with
processing, fog/edge frameworks for M-IoT computation,
comparable CR to other techniques. Compressed Sensing
cloud computation for M-IoT and SDNs for M-IoT
(CS) uses sparse signal structures to diminish the size of
computing. Table VII classifies and summarizes the
the transmitted or stored data.
existing work related to multimedia data computing in IoT.
Multimedia data is sparse in structure. CS is used for
A. MULTIMEDIA CODING AND COMPRESSION multimedia data acquisition and reconstruction. Li et al.
In conventional multimedia data encoding techniques, [41] exploit DL and AMP for improving IoT multimedia
data is compressed once and decoded whenever played. M- data reconstruction quality and minimize bandwidth
IoT devices are more concerned with uploading the data in utilization. Performance comparison of the DL-AMP
uplink transmission, which poses challenges on technique with EM-GM-GAMP, Gauss-AMP, fast-
BM3D-AMP, and other proposed CS techniques in the

21

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

cameras in [188]. Various video coding techniques, power


consumption analysis, and energy harvesting approaches is
Decision
Decision Analyst detailed in this article. Aljawarneh et al. [189] devised a
Graphics Processing Unit (GPU) encryption system based
on Feistel Encryption Scheme (FES) and Advanced
Feature
Knowledge and Data Storage
Extraction
Encryption Standard (AES) to secure medical multimedia
Features
Data Feature
data. The multimedia data is divided into equal-sized
Preprocessing Classification blocks, which are subdivided into plain text and keys. Each
key and plain text is then encrypted separately using FES
Data Data
Compression and AES, respectively. The genetic algorithm integrates

HEVC
Classification Remodelling
and Encoding separately encrypted keys and plain text to secure the data
Data Event
Encoding Detection from vulnerability. The system utilizes the GPU to process
graphics efficiently and provides parallel processing to
execute maximum tasks to increase system throughput.
Data Acquisition
B. EVENT PROCESSING
The M-IoT encompasses myriad applications in every
FIGURE 11. Multimedia data computing phases. Data is first field which varies in data capacities, features, nature of
efficiently acquired, compressed, and transmitted to computing unit outputs, and encoding formats. An increasing number of
for feature classification and extraction, and then the decision is
made on classified data.
devices and applications transits the nature of multimedia
traffic more towards unstructured events. Generic event
literature validates the proposed framework is suitable for detection and query processing framework is in need to
multimedia. A Joint full reference Quality Assessment process structured and unstructured multimedia events.
Metric (JQAM) based on the Human Visual System (HVS) Aslam et al. [190] proposed a Multimedia Stream
by considering binocular perception and image properties Processing Engine (MSPE) as a middleware with an
is projected in [184]. The proposed technique efficiently operator to analysis unstructured events in multimedia data
measures the image pixel, contrast, and structural and DNN processor to extract and match the features.
distortion by considering the luminance masking of the Publish/subscribe mechanism is adapted in which
image to access the quality of the image. Hu et al. in [185] multimedia devices send captured events to the
proposed a joint compression and transmission technique middleware and subscribers can access the desired events
to optimize energy usage based on the canonical Lyapunov by relevant classifiers from middleware by DNN based
optimization scheme for power-constrained multisensor matchers. Optimization models are adapted to analyze and
wearable devices. process a user’s query to achieve optimized throughput and
M-IoT devices are energy and resource-constrained. M- accuracy to serve the query. The integration of diverse
IoT devices are required to be computationally efficient as image analysis techniques could enhance the genericity of
most of the devices are battery operated. An efficient task the framework. Angsuchotmetee et al. in [191] offered
allocation strategy to maintain the QoS is required to assign Multimedia Semantic Sensor Network Ontology (MSSN-
the task to process in parallel dynamically. Wei et al. [186] Onto) to detect various events in a HetNet to provide
proposed a real-time approximate task computation syntactic and semantic interoperability. A multimedia
allocation strategy for MultiProcessor System on Chips application that involves more than one user requires
(MPSoC) to increase the number of executions in a hybrid syntactic and semantic interoperability to understand
energy environment. In a hybrid renewable energy system, different data encoding techniques and content-aware
the power supply is unpredictable. Authors designed a modeling. The proposed framework constitutes MSSN
dynamic task scheduler to adapt real-time varying indexer, application manager, and event processing engine
conditions in fluctuating energy availability. Khernane et to process and index the data stream concerning their
al. [187] discussed the tradeoff between video data coding feature levels, and serving the queries of the users from the
and quality at the user end while optimizing the energy for stored, indexed data.
the maximum life expectancy of the network. An entirely Xu et al. proposed an attention-in-attention (AIA)
distributed algorithm is presented to balance the power network in [192] for multievent recognition and
utilized to encode the video and video encoding rate. The representing the salient features of visual modality and
authors considered the dynamic nature of link capacity. semantic modality exploiting Convolutional Neural
The transmission errors are minimized by incorporating Network (CNN) for visual features extraction. AIA
retransmissions based on the two-state Markov chain. comprises Encoder Attention Modules (EAM) and Fusion
However, in this work, spectrum efficiency is not taken Attention Module (FAM) for desired features matching
into account, which is the key requirement for multimedia and fuses multi-dimensional features into a single-
data transmission. dimensional feature. The authors employed a Recurrent
A detailed survey on M2M communication is Neural Network (RNN) based Long Short-Term Memory
highlighting the issue and challenges in distributed video (LSTM) unit on decoding fused data into multi-events

22

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

TABLE VII
MULTIMEDIA COMPUTING PARADIGM IN M-IOT
Proposed Schemes Articles Year
Survey on Multimedia Big Data [45] 2018
High Efficiency of Video Coding [179] 2013
VP9 and DAALA for Video Coding [180] 2013
Comparative Analysis of H.264, H.265, VP9, DAALA [181] 2013
Computation Complexity Reduction Transcoder [182] 2018
Truncation Based Compression Technique ‘Scalerelativemax’ [183] 2017
Multimedia Coding Full Reference Quality Assessment Metric (JQAM) based on Humn Visual System [184] 2016
and Compression Dictionary Learning and Approximate Message Passing for MM reconstruction [41] 2017
Lyapunov Optimization Scheme For Power Constrained Multisensor Wearable Devices. [185] 2017
Approximate Task Computation Allocation Strategy For Multiprocessor System On Chips
(MPSOC) [186] 2018
Life Expectancy Maximization Of The Network [187] 2019
Issue And Challenges In Distributed Video Cameras [188] 2012
Graphics Processing Unit (GPU) Encryption System [189] 2017
Multimedia Stream Processing Engine (MSPE) As A Middleware [190] 2018
Multimedia Semantic Sensor Network Ontology (MSSN-Onto) for Multievent Detection [191] 2018
Event Processing Attention-In-Attention (AIA) Network For Multievent Recognition [192] 2018
Block-Based Motion Estimation (BME) [193] 2018
Energy Aware Selective Encryption For The High Motion Video Frame [194] 2019
[195], [196]
Cloud Computing Architecture and Issues 2008,2009,2010
[197]
M-IoT COMPUTING PARADIGM

Comprehensive Study on Integration of IoT and Cloud Computing [198] 2016


Efficient Energy Conservation by Optimal Cloud Resource Allocation [199] 2016
Cloudlet Based Distributed IoT Video Surveillance System to Reduce Latency [200], [201] 2015-16
Cloud Computing Cloudlet Based Face Detection and Face Denaturing for Privacy and Safety [202] 2017
Optimal Cloud-Video Crowdsensing [203] 2016
Flexible Analytical Cloud Framework To Be Accessible From Any Network [204] 2017
Cloud-Based Dynamic Programming Event Detection, Prediction and Bandwidth Allocation [205] 2017
Multimedia Sensing As A Service ‘MSaaS’ To Optimize Resource Allocation For Energy
Constrained M-IoT Devices.
[206] 2017
Optimizing Workload Scheduling in Fog-Cloud Framework for Maximizing Power
Conservation and Latency
[213] 2016
Fog Based Video Surveillance for Urban Traffic Monitoring System [214] 2016
Fog Comuting Collaborative Fog Computing for Load Sharing to Minimize Service Delay [215] 2017
Priced Timed Petri Nets (PTPNs) Based Fog Resource Allocation And Time Cost Prediction
To Improve QoS
[216] 2017
Improving Stream Processing In Real-Time Crowdsourcing, Event Processing And Real-
Time Stream Analytics By Incorporating Fog Computation In M-IoT Network
[217] 2017
Workload Allocation And Multimedia Data Prioritization Using In-Memory Edge Closedloop
Schedulling Method
[218] 2018
‘Geelytics’ A Geo-Distributed Real-Time Stream Processing For Dynamic Edge-Cloud
Network [219] 2015
Complex Event Processing Engine and Distributed Assignment Model for Reducing Data
Volume Flow in Fully Distributed Edge-Cloud Network [220] 2017
Edge Computing DL Based Edge Computing In M-IoT Network To Reduce Data Traffic From Iot Devices To
Cloud [221] 2018
Collaborative Edge-Cloud Framework to Analyze Live Data [222] 2017
Cooperative Video Processing in Edge M-IoT Network for Improving Human Detection in
Surveillance Systems
[223] 2018
Where’s The Bear, An Image Recognition Method At Edge To Conserve Bandwidth And
Reduce Latency [224] 2017
Event-Driven SDN Based Network Control Framework ‘Procera’ By Controlling And
Managing Dynamic Changes In The Network [225] 2013
SDN Flow Coordination For Persistent Data Delivery To Minimize Latency And Maximize
Packet Delivery Ratio In IoT SDN-Cloud Frame Work
[227] 2017
Multiobjective Energy Minimization Optimization Problem Based On Classified Workflow
Software Defined To Incorporate Dynamic Changes Using SDNs.
[234] 2018
Network Software Defined Mobile Edge Computing ‘SD-MEC’ Framework to Minimize Latency and
Bandwidth Usage
[235] 2015
Publish/Subscribe Unified Software Defined Framework to Reduce Network Latency and
Increase Throughput
[236] 2018
How SDNs Improves Cloud-Edge Computing [237], [46] 2017-18

labels. Multiple AIA modules can enhance event the computation time significantly. Parallel processing
recognition and representations of multimedia video incorporating GPU and directional motion estimation can
streaming. Saha et al. [193] presented a context-aware further augment the performance. Thiyagarajan et al. [194]
Block-based Motion Estimation (BME) approach to devised energy-aware selective encryption for the high
enhance multimedia compression. The author uses the motion video frame. The detection of high motion is
pixel distortion ratio to characterize the motion into a Large performed by the texture energy level of the frame which
Diamond Search Pattern (LDSP) or Small Diamond Search is classified by the DC coefficient in Discrete Cosine
Pattern (SDSP). The proposed scheme intends to reduce Transform (DCT) and the motion vector which expresses

23

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Platform as a Service (PaaS):


providing application development
PaaS platform as a service.

Infrastructure as a Service (IaaS):


providing hardware infrastructure i.e.,
storage, processing servers and
network as a service.
VM
Software as a Service (SaaS):
accessing application from cloud
IaaS Cloud Services

SaaS
Providing secure and safe encrypted
data delivery.

Increasing the privacy of the system.


.
Internet is used as connectivity for
high data rate, low latency and high
throughput.
Internet Connectivity

Cloud services can be utilized to


optimize QoS machine-to-machine
(M2M) communication.

QoE in Human-to-machine (H2M) or


Human-to-human (H2H) is optimized
by exploiting cloud services

Machine/Human Users

FIGURE 12. Cloud computing services for M-IoT. Cloud services are categorized as the platform as a service (PaaS), infrastructure as a
service (IaaS), and software as a service (SaaS). Cloud services can be studied for M2M and M2H communication. Cloud services require a
secure and safe connection between device and cloud.

descriptive information of video magnitude and phase access: the user required computation resources are
angle. The high value of the motion vector indicates high available over the Internet for heterogeneous platforms. 3)
motion activity and vice versa. For securing multimedia Resource pooling: similar resources are organized in pools
data and conserving energy in M-IoT, all syntax elements exploiting virtualization to serve multiple users. 4) Rapid
of high motion frames are encrypted. However, in low elasticity: the consumer resource requirements vary
energy frames, alternate syntax elements are encrypted. according to the network condition and application
regardless of having any knowledge about cloud
C. CLOUD COMPUTING FOR M-IoT
computation capacity. Therefore cloud servers are flexible
The miniature IoT devices and bulky nature of to address every user. 5) Measured services: The cloud
multimedia data necessitate excessively large and time- server monitors the resource usage of each user through
sensitive computation resources. Cloud computing offers metering capabilities. In addition to these elements, the
computing resources in a centralized manner instead of cloud services are categories as; Software as a Service
localized computing to augment energy conservation, QoS (SaaS): accessing application from cloud, Platform as a
and improves the life expectancy of the M-IoT network. Service (PaaS): providing application development
Computing pioneer ‘John McCarthy’ speculated cloud platform as a service, Infrastructure as a Service (IaaS):
computing in 1961 as ‘ computation may someday be providing hardware infrastructure i.e., storage, processing
organized as a public utility’ [195], which raises the servers and network as a service [195] as depicted in Fig.
question, what exactly cloud computing refers to. National 12. The cloud services are deployed in four models; private
Institute of Standards and Technology (NIST) defined cloud, community cloud, public cloud, and hybrid cloud
cloud computing in [196] as: “Cloud computing is a model [197]. In this section varied proposed cloud computing
for enabling convenient, on-demand network access to a schemes for M-IoT have been enlisted. A comprehensive
shared pool of configurable computing resources (e.g., study on the integration of cloud computing and IoT has
networks, servers, storage, applications, and services) that been presented in [198].
can be rapidly provisioned and released with minimal 1) MULTIMEDIA CLOUD COMPUTING IN IoT
management effort or service provider interaction.” The ubiquity of audio processing and cameras even in
Cloud computing encompasses five essential elements low-end devices increases the audio and visual recognition
[197]: 1) On-demand self-service: user with urgent applications. However, due to small size IoT devices,
requirement of CPU, storage, and software can avail the multimedia data processing requires additional
resources without human intervention. 2) Broad network computational services that are readily available. To cope

24

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

with this issue, the researcher has put forward several from limited uplink bandwidth based on future event
remote cloud computing scheme for multimedia predictions to transmit only meaningful information. The
processing. Renna et al. in [199] presented a framework to results show 80% event detection with 97% QoS
provide the optimal balance between energy consumption satisfaction, utilizing 10% of essential bandwidth. Wang et
to process the query and the cost incurred for cloud al. [206] devised multimedia sensing as a service (MSaaS),
computing by incorporating resource consumption an energy-efficient framework work to upload multimedia
according to the volume of query which either lies in the data by prioritizing it first and then optimally allocate
idle state or active state. network resources. The authors exploit the quad-tree
Ubiquitous and heterogeneous data generated from the decomposition algorithm to segregate regular and premium
surveillance system is transmitted to a centralized blocks. In this article, the truncation based resource
processing unit over limited bandwidth incur high latency. allocation optimization problem is formulated. A unified
Ali et al. [200], [201] proposed a cloudlet based, resource allocation metric is considered based on
lightweight distributed computing framework for IoT Automatic Repeat Request (ARQ), channel coding for
video surveillance systems to minimize network latency. Forwarding Error Correction (FEC), data rate, transmission
The cloudlet system brings cloud computation resources power and packet length subject to energy-constrained
closer to the IoT network to compute critical and sensitive quality optimization.
data in real-time. In this article, face recognition is
considered as a use case to validate the framework. D. FOG/EDGE COMPUTING.
Cloudlet exists between surveillance cameras and the
public cloud. Image/video captured by the camera is sent For decades cloud computing served as pay-as-you-go,
to the cloudlet for face recognition and feature extraction, managing and providing alternative solutions for data
which is transmitted to the public cloud for matching and centers and enterprises by providing remote storage units,
identification purposes. Cloudlet is a device with processing units, networks, servers and applications to
significant storage, CPU, and GPU. Preprocessing the serve multiple customers [207]. Cloud computing flows a
captured data before transmitting to the public cloud centralized processing infrastructure which is usually
significantly reduces the network latency. DNN based face located far from users or IoT proximity. However, cloud
detection ‘OpenFace’ in real-time video stream and face computing upsurges network overheads by transmitting the
denaturing named ‘RTFace’ technique for privacy and aggregated data from sensors to the centralized processing
safety has been presented in [202]. The proposed algorithm cloud and then acquiring back the analyzed data over
is implemented on cloudlets for speedy and efficient face bandwidth, latency, and energy-constrained network. M-
detection and denaturing. IoT network requires a model that can handle high velocity,
Crowdsensing is an important aspect of smart cities volume, and variety of data with minimum latency,
which provides ease in multimedia data aggregation by conserve bandwidth, reliability, globally secure and
exploiting multimedia sensor of public mobile phone, chooses the best processing unit in the least possible time.
wearable devices, and tablets. The acquired data is In 2012, Cisco introduced and defined fog computing as
wirelessly transmitted to the cloud in real-time due to the [208]: “The fog extends the cloud closer to the things that
limited storage capacity of the devices. HONG et al. [203] produce and act on IoT data.”
addressed three problems in cloud-based video Fog computing is the virtualized platform that offers
crowdsensing: 1) optimal transcoding, 2) the optimal data computation, storage units and routing devices between
transfer protocol and meta-data selection to upload a video User Equipment (UE) and traditional cloud, located at the
over WiFi, 3) camera parameters which require complete edge of the network, reducing the response time of the
video lookup. The authors presented three algorithms: system [209]. The fog-cloud hybrid computing architecture
Adaptive Transcoding Algorithm (ATA) based heuristic process the data in the following pattern. Critical time-
algorithm for video representation without quality sensitive and real-time data are processed on the fog node,
compromise. Protocol Selection Algorithm (PSA) to while less critical data that can tolerate minute delay is
dynamically select transmission protocol by comparing processed and stored on fog gateway node for a few hours.
average throughput normalized value achieved from FDT The regular periodic data that is not delay-sensitive is sent
and UDT. Cloud Database Algorithm (CDA) based on to the cloud to be processed and stored for offline access
Field-of-View (FoV) approach to manage videos in the [208]. Stojmenovic et al. [210] outlined a detailed overview
cloud database. of fog computation applications and challenges.
Authors in [204] devised an analytical framework to The term edge computing also refers to the notion of
serve the cloud access request from the access network, providing computation at the edge of the network. The
core, or edge network by maintaining an optimal number edge computing is defined as network processing and
of replicas to improve resource utilization. Cloud resources progressing between data origin and cloud unit
computing for event detection in a video stream and [211]. Detailed edge computing architecture and issues are
probabilistic future event prediction is detailed in [205]. presented in [211]. The smartphone act as an edge between
Authors proposed a dynamic programming based the user and the cloud. The processing unit is placed within
framework to efficiently allocate bandwidth resources the proximity of data producers to increase energy

25

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Slower

Cloud Computing
Big Multimedia Data
Processing, Big Data
Feature Extraction,
Data Analytics/Intelligence Business Logics, Data
Ware Housing, Online
and Offline Data Access
Possessing Response/Service Delay

Routers, Hubs, Gateways,


Micro Storages,

Fog Computing
Processors, Servers,
Local Area Networks
Data Analysis and
Reduction, Less Service
Response, Low Latency,
Distributed Processing,

Resource, CPU, Memory,

Edge Computing
Storage, Devices,
Embedded Systems,
Collaborative Edge.
Real Time Data
Preprocessing at Source.
Faster

Bandwidth, Throughput,
Latency, Jitter Minimization.

FIGURE 13. Fog/Edge computing in M-IoT. Fog/Edge devices reduce network overhead and latency by preprocessing the acquired multimedia
data at Fog/Edge nodes. Fog/Edge devices can be a smartphone, network hubs, gateways, routers, and servers.

efficiency, response time, and bandwidth allocation delay-sensitive traffic. Chen et al. [214] devised a fog-
optimization. Fog computing is referred to as edge based video surveillance system to monitor a speedy road
computing. However, the difference lies in the location of traffic system in urban areas using a drone camera. The
the computing unit is placed. Fog computing is employed authors proposed a tracking algorithm that extracts and
at the Local Area Network (LAN) or the gateways of the transmits image frames of interest to fog node to meet
network, whereas edge computing is embedded within the minimum computation and delay requirements. The
end or edge device, as shown in Fig. 13. Linthicum et al. tracking algorithm utilizes Bayes estimation and
describe edge computing as the concept, while fog probabilistic Monte Carlo simulations.
computing as a protocol to implement edge computing Yousefpour et al. in [215] presented a fog-cloud hybrid
[212]. The authors also highlighted the limitations of both generic framework to minimize the service latency by
the architectures in data computing. Various fog and edge sharing the load among fog nodes. The framework
computing frameworks, vision, and challenges in the M- considers the queue length and the type of service
IoT network are studied and presented in the subsection. requested, as the different application requires different
1) FOG COMPUTING IN M-IOT service time. The Fog layer offers collaborative
Extending the computing closer to the edge or access architecture to process a request exploiting the concept of
network raises several issues and challenges. Determining load sharing by offloading the service request to neighbor
and classifying critical multimedia data is necessary for fog nodes. Authors also put forward an approach to find the
load balancing on fog node and the cloud for optimal best fog node to process the request in minimum time by
efficiency. Excessive workload on fog node increases the using a centralized fog node for maintaining a reachability
power consumption, causing efficiency degradation. Deng table to offload the request to the node which offers
et al. [213] formulated a primal problem for maximizing minimum service delay. Minimum service delay and
power conservation in fog-cloud hybrid systems. Four propagation delay are measured using a recursive
layered fog-cloud frameworks have been proposed. analytical process. Simulation results depict the proposed
Moreover, the authors decompose the problem into three model outperforms No Fog Processing (NFP).
subproblems by specifying the tradeoff between latency Ni et al. [216] put forward a fog computation resource
and power consumption. The problem is subject to various allocation strategy based on Priced Timed Petri Nets
constraints: 1) delay at fog node, 2) Wide Area Network (PTPNs) that considers price and time cost of task
(WAN) communication system between fog and cloud completion. The proposed scheme utilizes a dynamic
server, 3) bandwidth and network overheads at the cloud recursive algorithm for fog resource allocation. The
server. Simulation results show that the proposed authors also presented a probabilistic model to predict the
framework improves latency and power consumption for time cost of task completion. The framework provides a
novel scheme for users to select the resource pool that

26

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

fulfills their requirements. The innovation can still be formulates an optimization problem to maximize the
improved by implementing the ML technique to train the average video coding rate subject to deadline and group
system by mapping the nature of services with required fog formulation constraint. Group formulation problem is
resource and service time. Yang in [217] discussed fog solved by considering it as Winner Determination Problem
architectures for data stream processing in four different (WDP), which states that the video chunks are allocated to
applications: 1) IoT stream analytics, 2) real-time the group of edge nodes which maximizes the overall
crowdsourcing, 3) network control, 4) event processing. utility. Simulation results validate that the proposed work
The author investigates various issues and challenges in outperforms no cooperation and an arbitrary model. Elias
applications focused on real-time monitoring and et al. [224] devised Where’s The Bear (WTB), an image
crowdsourcing. The main objective of this architecture is processing technique for edge computing based on NN to
to incorporate fog computation in the M-IoT network that recognize animals in wildlife monitoring systems. The
augments the network throughput, latency, fairness, objectives of WTB are to conserve bandwidth and improve
stability, and reliability. accuracy. WTB exploits Google TensorFlow for image
2) EDGE COMPUTING IN M-IOT recognition and classification, and OpenCV for analysis.
Communication between M-IoT devices, edge devices, Results show that implementing image recognition at the
and cloud incur additional delay if the tasks are not edge of the network where the images are acquired reduces
properly scheduled. Xu et al. [218] introduced the concept latency and conserves bandwidth.
of optimizing in-memory processing to reduce the delay E. SOFTWARE-DEFINED NETWORKS
and latency of the network. Three-tier architecture is
proposed to formulate closed-loop feedback scheduling Several devices are responsible for handling network in
and prioritization model to integrate memories of all the IoT, such as, routers, switches, and embedded devices.
edge devices to balance workload allocation. Results depict These devices are equipped with integrated circuits, that
improvement in latencies for M-IoT systems and rational are pre-programmed to execute predetermined tasks. Such
workload allocation. Genetics a geo-distributed real-time devices are not reconfigurable with dynamic changes in the
stream processing for the dynamic edge-cloud network is network to support real-time multitasking. The expected 50
proposed in [219] to achieve low latency by exploiting billion connected devices could generate 600 ZB annually
minimum bandwidth allocation and task sharing. A by 2020 [176]. Transmitting such a huge amount of data to
distributed Complex Event Processing engine (CEP) for a the cloud for analysis and processing may lead to
fully distributed edge IoT network is presented in [220]. developing network congestion, which can cause latency
CEP utilizes both events based and stream-based and bandwidth issues affecting overall QoS and QoE. To
approaches. The authors proposed a heuristic assignment cope with this problem, most of the technology giants like
model for task distribution for a balanced workload Cisco and IBM offered to process the data closer to the
between edge devices and cloud. Results show 6.6 times network’s edge to achieve high data rates and low latency.
less data volume flow as compared to a centralized However, edge processing may incur high energy
framework. consumption.
Li et al. [221] proposed CNN based deep leaning To deal with issues mentioned above a flexible, scalable,
optimization problem to maximize the number of tasks for reprogrammable, and reconfigurable M-IoT architecture is
edge devices subject to limited bandwidth and system in need to manage multimedia traffic flow and data
capacity. The authors aim to reduce the network traffic and computation to optimize energy consumption and
overheads from M-IoT devices to the cloud. The system is performance. SDN is an emerging network technology that
designed for online and offline video processing, as video offers flexible, interoperable, reconfigurable, and
processing is the integration of computer vision and image reprogrammable network architecture to satisfy dynamic
processing. Sharma et al. [222] devised a collaborative changes in the network. SDN compromises network
edge-cloud framework. The framework utilizes the historic management [225], network virtualization [226], network
cloud computing data to aid edge computation to analyze accessibility [227], resource utilization [228], energy
live data for maintaining QoS. The authors also highlighted management [229], security and privacy [230] by
the issues, challenges, and limitations of both edge and segregating network control from hardware devices [231].
cloud computing. Furthermore, the motivation for a The main objective of the SDN is to decouple the control
collaborative edge-cloud framework is also outlined. plane from the data plane to rationalize the network. This
Long et al. in [223] proposed an edge M-IoT framework network device now acts as a Forwarding Device (FD), that
to process video on edge devices to improve the accuracy forwards a sequence of packets from source to destination
of human detection in surveillance systems. The proposed by regulatory policies [232]. The control plane in SDN is a
framework utilizes D2D communication to transmit the centralized unit while the data plane works in a distributed
divided and compressed video frames to nearby edge nodes manner.
that form cooperative groups to process the video frames The Telecommunication Management Network (TMN)
transmitted to them in multicast or unicast fashion. The architecture comprises three planes: management, data,
authors deduced that human detection accuracy is and control plane. Management plane forms the
positively correlated with the video coding rate and maintenance and operations unit of the network, i.e.,

27

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Real-Time Multimedia

Application
Smart City E-Health Smart Grid
Application

Plane
Load Balancer Mobility Management Firewall

Northbound API

Internet Topology
Management

Resource Allocation

SDN Controller
Secondary Southbound API Policy Development
Controller

Scheduler

Service-Specific
Reprogrammable

Primary Controller

Gateway

Switch

Data Plane
CMOS Camera
Camera Sensor Video Camcorder Mobile Phones integrated Wearable
Devices

Transmission of Multimedia Data using


Bluetooth/Zigbee/IEEE 802.15.6 Wireless Wired

FIGURE 14. The architecture of Software-Defined Networks (SDNs) for multimedia computing. SDNs offers scalability, flexibility,
reconfigurability, and re-programmability for efficient network management. SDNs separates data planes from the control plane and provide
four APIs.

human operators and software that monitors the status, stream processing comprehends real-time applications that
configure and update the network. The data plan performs are latency-sensitive. Upon the classification of workflow,
data transmission by following the flow decisions of the network control logic are configured and implemented.
controller in the control plane. This plane constitutes all the The authors have formulated multi-objective optimization
FDs such as routers, switches, firewalls, and embedded problems for each control logic, which exploits the
circuits. The control plane is a centralized controller to Tchebycheff decomposition algorithm to solve the
configure and reprogram the network, for instance, problems to minimize energy consumption by efficient
network path, routing protocols, network policies routing path selection and scheduling. Results show that
according to the application requirements [233]. The SDN incorporating dynamic network changes according to the
comprises two Application Programming Interfaces classified workflow enhances the energy efficiency
(APIs), i.e., northbound API that is responsible for meeting SLA. Salman et al. [235] proposed Software-
providing communication between application plane and Defined Mobile Edge Computing (SD-MEC) architecture
controller, whereas southbound API supports to reduce latency and bandwidth by combining the features
communication between the controller and network of both SDN and edge computing. The proposed
devices as shown in Fig. 14. This section presents studies framework offers scalability by managing the distributed
and proposed schemes associated with multimedia data edge network with SDN controllers to incorporate network
computation by employing SDN. changes and developing new services. Wang et al. [236]
1) MULTIMEDIA COMPUTING IN SDN presented SDN-based-Publish/Subscribe (SDNPS) unified
SDNs are not specifically introduced for data computing. framework to serve multiple IoT applications. The
However, managing the network proficiently by SDNs presented framework aims to reduce the latency and
could reduce the computing complexity to yield low throughput of the network with publishers that publish the
latency and fewer overheads. Kaur et al. in [234] devised generated data and offer services tagged with specific event
SDN as a middleware in edge-cloud hybrid architectures to topics to SDN. The subscribers that require specific event
improve the energy efficiency of the stream processing. services receive their desired services from SDN based
The framework provides the classification of data flow into middleware without interaction with the publisher. SDNPS
batch processing and stream processing. Batch processing leads to a unified, interoperable framework. Baktir et al.
is more focussed on network service bandwidth while [237] detailed the limitations and challenges of cloud-edge

28

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Application Layer

Protocols
COAP MQTT DDS AMQP

MQTT-SN XMPP HTTP HTTP REST

Network Layer

Protocols RPL RTP RTCP CTP


Routing

CARP LOAD CORPL E-CARP


Addressing

IPv4 IPv6 6TiSCH 6Lo


Protocols

6LoWPAN IPv6 Over BLE IPv6 Over G.9959

Physical Layer
PHY-MAC

IEEE 802.15.4 BLE Zigbee IEEE 802.15.6

NFC LoRaWAN NB-IoT WiFi

FIGURE 15. Standards and protocols of three layered IoT framework [2].

computing with increasing data traffic and proposed a interoperable architecture. A tabular summarization of this
vision of SDN based network management strategy to section can be seen in Table VII.
decrease the complexity of cloud-edge architectures.
Authors have highlighted several use cases, including VI. ROUTING PROTOCOLS FOR MULTIMEDIA IN IoT
multimedia data computation in IoT for face detection and
Multimedia data exhibits stringent requirements
revealed the benefits of incorporating SDNs to add
according to diverse characteristics in terms of volume,
scalability and reliability in the network. A comprehensive
variety, velocity, and value, especially for efficient
survey and future research direction on SDN and fog
bandwidth utilization and reliability. The deviation from
computing is presented by Salman et al. [46].
Moore’s law, multimedia devices are now becoming
F. SUMMARY AND INSIGHTS smaller in size, with a decrease in cost and memory to
support mobility [3]. The current standards and protocols,
In this section, the limitations of underlying M-IoT
as shown in Fig. 15, consume a significant amount of
architectures for multimedia communication has been
bandwidth and energy to ensure reliability. These
discussed. Various multimedia encoding and compression
communication protocols are not optimized for low power
techniques to reduce the complexity of multimedia data
multimedia communication. The current standardization
transmission in IoT has been detailed in [179]- [189].
activities are not focussed on multimedia communication
Detection, extraction, and event processing of meaningful
over IoT. ITU defines traffic routing of mobile services in
information from multimedia data has been studied in
ITU-T Recommendation E.170 [238] as: “establishing a
[190]- [194] for efficient network resource utilization. The
successful connection between two exchanges or the
vision of cloud computing and various studies to analysis
selection of path between source and sink node in the
and process multimedia data over the Internet through
network.” An intelligent routing protocol is in need to
remote access is present in [195]- [206]. Increasing
select an efficient route for multimedia content
network overheads and the latency due to cloud computing
transmission over bandwidth and memory-constrained
has been discussed, the concept of fog\edge computing to
wireless IoT network.
minimize network latency for real-time applications is
The scarcity of IPv4 urges the recommendation of IPv6
discussed in [213]- [224]. The notion of SDNs to enhance
for smart IoT objects. 6LoWPAN is an IP based technology
the scalability and interoperability to support
for Low-power and Lossy Networks (LLNs) to bridge the
heterogeneous M-IoT devices has been explained. Various
gap between low-power devices and the IP world [239].
studies related to SDN based fog\edge-cloud computing to
6LoWPAN compresses IPv6 headers and fragmentation of
reduce computing latency and overheads have been
large packets to make IPv6 suitable for resource-
presented in [176]- [46]. SDNs, not only provides
constrained devices [240]. International Engineering Task
reconfigurability but also offers a more scalable and
Force (IETF) proposed an IPv6 Routing Protocol for LLNs

29

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Routing Protocols for M-IoT

Multimedia Routing Cross Layer Protocols Multicast and Hop


QoS-Aware Routing
[19], [247] [38-39], [259-262] Based [20]

Energy-Aware
[15], [37], [248],
Cluster-Based Multicast
[254-255] [14], [264]
[249]

Load
SDN Based Multi-hop
Balancing [256-257] [265-267]
[250]

Fault Tolerant Distributed


[251] [258]

Delay-Aware
[252]

Mobility
[253]

FIGURE 16. Existing work on routing protocol for M-IoT is classified on their capability to transmit multimedia data in single-hop or multi-
hop or multicast manner or on the basis of QoS requirements.

(RPL) [241], [242]. RPL is now widely adopted as a distributed algorithm, designed for ubiquitous multimedia
promising standard with increasing popularity because it transmission based on the information value of data and
offers flexibility and interoperability by adopting different capacity of the mobile user concerning it’s moving speed.
network topologies. RPL exploits key network metrics In the proposed model, a mobile user constructs the data
such as throughput, node energy, latency, hop count, and collection tree, based on its capacity and moving speed.
link reliability. RPL supports Point-to-Point (P2P), Point- The route is selected based on information gain, which is
to-MultiPoint (P2MP) and MultiPoint-to-Point (MP2P) calculated in the context of communication cost and
communication paradigm. Kim et al. [243] provided a information value. The aim of the proposed work to
detailed picture of the research that has investigated RPL. maximize information gain and reduce energy
The authors presented the distribution of research carried consumption.
out on RPL in the context of the geographical region, Energy harvesting has shifted the design paradigm from
operating systems, hardware platforms, and network energy-aware to Energy-Harvesting-Aware (EHA).
metrics. A plethora of work and survey studies of the IoT Nguyen et al. [248] devised the EHA Routing Algorithm
communication protocols mentioned in Fig. 16 are present (EHARA) based on the energy-backoff process and energy
in the literature [11], [244], [245], [246]. In this section, we prediction process that defines cost metrics to select the
have extensively studied routing of multimedia content, best route. A hybrid energy harvesting sources are
i.e., audio, image, and video in IoT to meet the stringent considered in the proposed work, i.e., solar panels, moving
requirements of multimedia communication in IoT while vehicle-based, and RF-based. The energy prediction
maintaining QoS and QoE with efficient bandwidth and process utilizes a Kalman filter approach that considers
energy utilization. Fig. 16 shows the classification of the previous time step and current statistics to determine an
existing works on multimedia routing in IoT. Cross-layer improved estimation of current energy arrivals from
communication protocol for multimedia data routing in IoT different sources. The energy backoff process is proposed
has been discussed. Routing protocols for multimedia data to extend the network lifetime by putting the nodes with
streaming in a multicast or unicast manner to provide the minimum energy to sleep that are unable to perform
required QoS has been extensively studied. Table VIII operations until the energy level is recovered. The node
tabulates the performance summary and comparison of with the highest energy level and minimum cost link based
studies on multimedia data routing in IoT. on Dijkstra’s shortest path is selected to route the data.
Carbon Dioxide (𝐶𝑂2 ) emission is one of the vital
A. MULTIMEDIA DATA ROUTING IN M-IoT factors affecting the network or node lifetime in green
communication. Alvi et al. [15] proposed green-RPL
The recent studies on routing protocols for M-IoT
routing for M-IoT to route the multimedia data by selecting
discuss the transmission of data in varied perspectives, i.e.,
the parent node operating on green energy that consumes
the transmission of audio, image, and video streaming in
minimum energy and delays to the sink. The objective of
the context of energy, workload balance, fault tolerance
the green-RPL is to minimize carbon footprint subject to
and delay in time [19], [247].
1) ENERGY-AWARE ROUTING path delay, path energy, residual energy, and idle time.
Xu et al. [37] proposed EQRoute, an energy-aware, and Trinh et al. in [249] presented SPIDER, a sustainable
QoI-aware routing algorithm. The EQRoute is a policy-based intelligence-driven edge routing algorithm

30

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

based on MEC to detect geographical obstacles using DL return. Performance is evaluated in the context of delivery
to aid the routing engine to efficiently offload the data and ratio and average delay for data collection.
route the priority data in an emergency for energy 5) MOBILITY
conservation. The proposed work presents a facial Mobility is one of the key requirements of rapidly
recognition use case in a disaster scenario. evolving multimedia IoT applications. However, the
2) LOAD BALANCING majority of research has ignored mobility. Jeong et al. in
Packet loss due to heavy traffic and power depletion are [253] proposed MAPLE, a routing architecture based on
two main reasons for network congestion. Taghizadeh et mobility support Asymmetric Transmit Power (ATP) for
al. in [250] address these problems by proposing Context- LLNs. MAPLE utilizes a single high power periodic
aware and Load balancing RPL (CLPRL). The proposed beacon in the downlink from the gateway to create a
work offers Context-Aware Objective Function (CAOF) Received Signal Strength Indicator (RSSI) gradient field
and Context-Aware Routing metric (CARF) to improve network. Any low power node can route the data for uplink
RPL. CAOF ranks the nodes for the selection of a parent transmission in a multi-hop manner using the RSSI
node based on the residual power level of the node and the gradient values of neighboring nodes. High RSSI value
Expected Transmission Count (ETX). After ranking, indicates high proximity to the gateway. Each high power
CARF takes the buffer queue utilization, node rank and beacon updates the RSSI gradient metric for uplink
network traffic dynamicity index that indicates the routing, which addresses the mobility problem, improves
utilization of link in the past, to compute the route during reliability and reduces the overheads in the network.
heavy traffic conditions. The authors ensure the load MAPLE also reduces energy consumption because of
balancing by considering the number of children node with single high power downlink transmission using ATP
a parent from the list of candidate parent nodes for parent architecture.
selection. It helps in load balancing even if a node is
eligible to be a parent node, but a large number of children B. QOS AWARE ROUTING
node can create loops and network congestion. QoS-aware frameworks to route wireless multimedia
data in IoT network for bandwidth-hungry and delay-
3) FAULT-TOLERANT sensitive applications have been taken into consideration.
The miniature multimedia sensors are equipped with The definition and requirements of the QoS-aware
limited battery power. The exhaustion of the battery leads framework have been discussed in the earlier section.
to network failure. Lin et al. [251] proposed a fault-tolerant Below is the description of some of the QoS-aware routing
routing for Cluster Head based (CH) HetNets. The protocols to support multimedia communication in IoT.
proposed scheme addresses three problems that are the pre-
verifying the fault-tolerant capability, distributing the load 1) CLUSTER-BASED QOS-AWARE ROUTING
and optimizing the fault-tolerant cost. These problems are Amjad et al. in [254] proposed centralized energy-
dealt with by the sink node with a virtual CH approach that efficient QoS-aware and Heterogeneously Clustered
estimates all the traffic in the network and verifies the Routing (QHCR) for delay-sensitive real-time
sustainability of IoT application. Virtual CH combines all applications. The network area is divided into different
the energy resources of non-failure CHs, estimates the size energy levels, and Cost Values (Cv) that are determined
of sensed data to be transmitted and verify the capability of based on distance from the Base Station (BS), initial energy
tolerance offered by non-failure CHs in the network. After levels, number of nodes, and weights. The cluster head is
which an optimal fault-tolerant route is determined from elected on it’s Cv. The shortest path to the destination is
the flow-bipartite graph that represents all the possible selected based on path metric that is the combination of the
routes between faulty and non-faulty CHs. initial energy of node, ETX, and inverse ETX, cost value
of cluster head and minimum loss with QoS as a constraint.
4) DELAY-AWARE The proposed model offers intra-cluster multipath
Multimedia data poses delay-sensitive characteristics. communication for the nodes that are at a significant
Dropping priority and meaningful multimedia data packets distance from BS. Real-time multimedia and non-real-time
decrease the reliability of the application. Li et al. in [252] data are transmitted over separate paths to reduce end-to-
proposed mobile sensing vehicles for multimedia data end delay and conserve energy. Filho et al. [255] devised
collection to optimize delay and delivery ratio (DDSV). a QoS-aware routing protocol to eliminate the need for a
Mobile vehicles equipped with IoT devices are exploited to routing table. The proposed scheme is based on a Trellis
deliver data to and from multimedia IoT devices to data Coded Network (TCNet) utilizing a Mealy Machine (MM)
centers. The proposed work addresses three problems in or Finite State Machine (FSM). QoS is maintained using
the context of multimedia data packets that are data MultiProtocol Label Switching (MPLS).
collection impartiality, delivery ratio, and delay. DDSV
proposes priority assignment based-upon distance from the 2) SDN BASED QOS-AWARE ROUTING
data center to overcome data collection impartiality. The Bahnasse et al. in [256] devised QoS-aware SDN based
vehicle with a high probability to pass through a data center smart and dynamic model to allocate bandwidth (Smart
is given high priority to deliver high priority data packets, Alloc) for MPLS Traffic Engineering DiffServ Aware
which will augment delivery ratio and reduces delay in

31

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2020.2964280, IEEE Access

TABLE VIII
THE EXISTING WORK ON M-IOT IN CONTEXT OF MULTIMEDIA DATA ROUTING
Performance Metric

Throughput
Bandwidth

Reliability

Tolerance

Balancing
Mobility
Latency

Energy
Articles Year Performance Evaluation

Fault

Load
‘EQRoute’ a distributed routing algorithm to maximize information gain and reduce energy consumption. Performance is evaluated based on received packets vs speed,
[37] 2018 ×  ×   × ×  energy consumption vs speed and packet delay vs speed. Results show EQRoute outperforms 𝜆-flooding algrithm.
‘EHARA’ an energy-harvesting-aware routing algorithm to select the best route based on energy prediction, energy backoff process and minimum link cost based on
[248] 2018 ×    ×  × × Dijkstra’s shortest path. Performance is evaluated on various traffic load. Results show that EHARA improves statistics in terms of average energy consumption, network
Multimedia Data Routing

lifetime, PLR, throughput and end-to-end delay.


‘Green-RPL’, an enhanced version of RPL that considers the minimization of carbon footprint by selecting the parent node that consumes minimum energy and delays to
[15] 2015 ×    × × × × route the data to sink. Results show that Green-RPL delivers a significant amount of packets as compared to OF0 and ETX objective function but consumes more energy,
however, a packet transmitted in a similar time is much higher than ETX and OF0.
‘SPIDER’ MEC based a sustainable policy-based intelligence-driven edge routing algorithm. Results show SPIDER improves routing sustainability, energy awareness
[249] 2018 × ×   ×  × × and throughput.
‘CLRPL’ a context-aware and load balanced RPL to improve network lifetime, PLR and energy conservation. Results show that PLR of CLRPL is 100% less than RPL
[250] 2018 × ×   ×  ×  with 10% improvement in keeping a node alive, less energy consumption as compared to RPL with enhanced network lifetime.
Fault-tolerant routing exploiting virtual CH with minimum energy consumption for backup. Results show that proposed work reduces 84% of average backup energy
[251] 2019 × × ×  × ×  × consumption and improves the network’s lifespan.
‘MAPLE’ a mobility support asymmetric transmit power in LLNs. Results show MAPLE outperforms RPL, ORPL, LOADng and improves performance by 27%/55%,
[251] 2018 × × ×    × × and 18% in the context of uplink\downlink reliability and energy.
‘DDSV’, mobile sensing vehicles for multimedia data collection to optimize delay and delivery ratio. Results show 17% decrease in delay 16.9% improvement in delivery
[252] 2018 ×  × × ×  × × ratio as compared to optimal vehicular data forwarding (OVDF).
‘QHCR’ provides QoS-aware multipath routing protocol for real-time delay sensitive applications in HetNets. Results shows significant improvement in network life-time,
[254] 2017 ×    ×    throughput, stability, energy conservation and end-to-end delay.
Routing Protocols

  
QoS-Aware

[255] 2012 × × × × × TCNet based QoS routing protocol for self-configurable networks to mitigate latency. The proposed protocols follows MPLS to maintain QoS criteria.
‘SmartAlloc’ adaptively allocates bandwidth according to SLA. Performance is evaluated for VoIP, video transmission and HTTP applications. Results shows 69% lower
[256] 2018    × ×  ×  jitter, 18% reduced delay, 69% reduced HTTP page response and 69% better throughput.
‘Sway’, a SDN based QoS-aware routing protocol to determine an optimal path according to the type of traffic for HetNets. Performance is evaluated on the basis of end-
[257] 2018   × × ×  × × to-end delay and QoS violation.
Distributed QoS-aware meta-routing protocol to achieve efficient reliability and timeliness. Performance is evaluated in comparison with Flooding algorithm. Results
[258] 2016   × × ×   × show a significant reduction in the number of packets transmission to achieve better reliability and timeliness.
[38] 2017 ×  ×  × × × × Cross layer communication protocol based on multi-objective optimization and ME-CBCCP routing protocol. Result shows 10-15% improvement in energy and time.
Cross-Layer Protocols

EQM cross layer protocol to reduce latency and energy consumption with improved throughput. Results depicts improvement in delay gain by 100%, 30% in packet
[260] 2018 ×    ×  × × delivery ratio and 80% delivery ratio of video content. MOS value of 2.5/5.0 was achieved for video content.
‘LinGO’, a cross-layer opportunistic routing protocol that considers link quality, distance and energy of the forwarding node for video transmission. Results are evaluated
[261] 2014   ×    × × using structural similarity (SSIM) and MOS values with 30% video quality improvement in SSIM gain.

[39] 2018 ×  ×  × × × × QoS aware agent based cross layer protocol to reduce end-to-end delay. Results depicts 100% reduction in end-to-end delay.

M/M/1 queuing model for adaptive switching between end-to-end transmission or hop-by-hop transmission. Duty cycling is based on bit error rate and critical path loss.
[262] 2018 ×    × × × × Results depict that end-to-end transmission with non-return-to-zero (NRZ) encoding shows better efficiency in terms of throughput, energy consumption and delay over
the multi-hop transmission.
[263] A comprehensive review in the context of multipath and multi-hop routing for best effort and real-time data. Authors presented a mechanism for multipath routing and
2017        
Multicast and Hop-Count

[20] discussed each performance metrics.


‘FAMOUS’, a multiconstrained multicast routing algorithm based on SPT and MST for multimedia real-time applications. Results show a comparison in the context of
[14] 2017 ×  × × ×  × × speed and accuracy.
Based Routing

‘EEMGR’ protocol based on ETX, residual energy and distance approximate the good link for successfully delivering the data. Results are compared with TPGF algorithm
[264] 2018 ×  ×  ×  × × in the context of link quality approximation, network lifetime and discovery of reliable and energy efficient paths.
CM2MNs for opportunistic relay selection to route multimedia data based on the M/M/1∞FCFS queueing model. Performance of the model is evaluated on the basis of
[265] 2016 ×  × × ×  × × the probability of delay violation. Results show CQC keeps the traffic within the threshold of tolerable delay violation.
MPSS and MPMS routing algorithms to transmit multimedia data using spline trajectories. Performance is evaluated in the context of energy consumption and end-to-end
[266] 2016 ×  ×  × × × × delay. Results show proposed algorithm can efficiently meet QoS requirements.
TCP based node ranking for D2D communication to route data in IoT. Performance is evaluated based on connectivity probability that depends on the geographical
[267] 2018 ×  ×  × × × × distance between source and receiver.

32

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

(DS-TE) network. The proposed architecture translates the Rosario et al. [261] proposed LinGO, QoE aware link
QoS requirements of an application into commands that quality and geographical beaconless opportunistic routing
indicates bandwidth and priority requirements. The SLA of protocol for video transmission in IoT. Forwarding node
each application is detected in terms of delay, loss rate, selection and routing path are determined according to
jitter, HTTP load time, and TCP session delay, and cross-layer parameters that are: 1) link quality indicator
threshold values are set. Smart-alloc adaptively allocates classified by packet reception ratio, 2) progress which is
the bandwidth according to the status of SLA. Sway, an the Euclidian distance between forwarding node to the
SDN based QoS-aware routing protocol for delay-sensitive destination, 3) energy of the forwarding node. The
and loss-sensitive application, is presented in [257]. Sway proposed model increases the reliability by adding
exploits Yen’s K-shortest path algorithm to compute redundancy packets for high priority video packets which
traffic-aware (delay-sensitive or loss-sensitive) best improve QoE. Devi et al. [39] proposed an agent-based
routing path while considering QoS requirements for each cross-layer protocol for optimal path selection and
packet. Multi-constrained QoS metrics are considered that reducing end-to-end delay to transmit important
are the delay, packet loss probability, and bandwidth. multimedia data with minimum latency. The proposed
Integer linear programming is utilized to solve a multi- model exploits the agents to transmit the data when the
constrained QoS-aware route. channel consumes more time than a threshold time. Hassan
3) DISTRIBUTED QOS-AWARE ROUTING et al. [262] presented a cross-layer framework to ensure
Shih et al. [258] devised a meta routing protocol for QoS satisfaction. A channel access mechanism based on
QoS-aware architectures to select the optimum path queuing model M/M/1 is formulated for the duty cycle to
between gateways of HetNets. Gateways are registered in handle the packets of real-time applications. The impact of
the network by broadcasting messages comprising the multi-hop communication is analyzed using PHY-MAC
information of all the network interfaces. Nodes in each parameters that are transmission power, hop distance, path
network update their table with the addresses of reachable loss, and packet error ratio (PER) for adaptive switching
network gateways and interfaces. The optimum path is between end-to-end transmission or hop-by-hop
selected by measuring QoS metrics of each gateway link transmission scheme.
that is timeliness and reliability. When the QoS
requirement is not satisfied, the meta-router will transmit D. MULTICAST AND HOP-COUNT BASED ROUTING
data on multiple paths to achieve maximum QoS. Routing protocols for multimedia bandwidth-hungry and
C. CROSS-LAYER PROTOCOLS FOR MULTIMEDIA
real-time applications of M-IoT have been designed based
ROUTING on multicast and hop-count metric [263]. A detailed survey
on multipath routing protocols of M-IoT to ensure QoS
Rani et al. [38] proposed a cross-layer protocol to
parameters has been presented in [20]. Below-mentioned
minimize energy consumption and response time. The
are few studies in the context of multicast and multi-hop
authors formulated a multi-objective optimization problem
routing protocols of M-IoT.
to minimize the end-to-end packet error rate, time, and
energy. These parameters are interlinked and dependant on 1) MULTICAST ROUTING
cross-layer parameters such as path loss, modulation Multimedia real-time critical applications require the
scheme, BER, transmission power, ARQ, duty cycling, and network to guarantee multiple QoS metrics that are
network routing protocol. The optimization of these maximum throughput, minimum delay, and minimum
parameters requires cross-layer communication and PLR. Multimedia communication requires multicast
coordination. Authors exploit the Minimum Energy routing with minimum end-to-end latency for delay-
consumption Chain-Based Cluster Coordination sensitive health applications. A Fast Multiconstrained
Algorithm (ME-CBCCP) presented in [259], which finds Multicast Routing Algorithm (FAMOUS) is proposed in
the shortest path not only at the local cluster level but also [14]. The proposed routing scheme is based on Shortest
takes the intercluster path into consideration. Bennis et al. Path Algorithm (SPT) and Minimum Steiner Tree (MST)
[260] devised Efficient Queuing Multimedia (EQM), a algorithm. Authors exploit entropy-based weight
cross-layer communication protocol for transmitting aggregation to reduce multicriteria decision problems into
multimedia data over wireless networks. A carrier sense a single criterion problem. The objective of FAMOUS is to
aware disjoint multipath routing protocol is presented to determine the shortest path and optimal multicast tree from
transmit high priority independent video frames by source to destination for better accuracy and speed. Aswale
reserving 2-hops neighbor nodes for video frames. The et al. in [264] presented Energy and ETX Aware Multipath
routing layer coordinates with the MAC layer to be aware Geographic Routing (EEMGR) protocol. ETX is a link
of priority video data. An enqueuing and dequeuing quality metric that estimates the number of transmissions
approach is presented to process high priority multimedia required to deliver a packet from source to destination
data first and scalar data at the last of the queue. The successfully. EEMGR exploits ETX, node remaining
proposed work aims to reduce waiting for the time and energy and distance between a node to sink to determine
energy consumption of wireless networks. the optimal path for reliable and energy-efficient
multimedia routing. Performance comparison is made with

33

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

the Two-Phase Geographic Greedy Forwarding (TPGF) to be explored in detail. The existing studies on multimedia
algorithm. routing protocols do not consider efficient bandwidth
2) MULTI-HOP ROUTING utilization and fault tolerance. Lightweight and energy
The real-time multimedia applications demand a efficient ML algorithms like reinforcement learning, Q-
probability of zero percent delay violation. A cooperative learning, Epsilon greedy are yet to be investigated for
relaying model incorporating Cognitive M2M Network latency reduction and improve power conservation for
(CM2MN) is proposed in [265] for effective end-to-end multimedia routing in IoT. Table VIII presents a detailed
QoS. Probabilistic forwarding protocol (PFP) based on a overview of this section, classifying each study and
network-aware routing algorithm for multi-hop routing is highlighting it’s key features.
presented. Cooperative Quality Controller (CQC) is
formulated to guarantee QoS requirements. The VII. PHY-MAC PROTOCOLS FOR M-IoT
opportunistic relay selection as a routing extension is based The network protocol stack of the IoT architecture rests on
on the M/M/1 queueing model with First-Come-First- the joint PHY-MAC layer as depicted in Fig. 16. The
Serve (FCFS) strategy. Chen et al. [266] presented protocols under this layer, feature low power operations
Multipath Planning for the Single source (MPSS) and and guarantee a stringent QoS compliant performance. The
Multiple Sources (MPMS) for multimedia transmission in discussion of the M-IoT applications in the preceding
IoT. The proposed work is based on B-spline trajectories. sections indicates a general guideline for the design of the
MPSS comprises two units that are the calculation of the PHY-MAC protocols. These guidelines include an ability
hop count module, which determines the number of hops to manage a dense, as well as a sparse network, with a small
required to satisfy QoS delay and energy-saving module network overhead, over a wide range and with a low energy
that determines the minimum power required to deliver the requirement [272]. The applicability of M-IoT in the wide
data successfully. Utilizing spline trajectories, the source range of applications like industrial monitoring, healthcare,
can determine the direction of next-hop by integrating security, and smart services in smart city applications
parametric functions for geographical routing. The aim is implies that there are multiple QoS and QoE parameters for
to determine multiple paths that satisfy QoS with minimum each application. Additionally, the heterogeneity of the
energy consumption. The optimum path with the least devices in the network creates a set of challenges in terms
energy consumption is selected. The performance of the of interoperability. That results in a need for application-
system is evaluated based on end-to-end delay and energy oriented data transformations at the network gateway
consumption. Chen et al. in [267] devised a Trusted [273]. Therefore, the PHY-MAC layer for each application
Connectivity Probability (TCP) based D2D relay selection is designed to fulfill these QoS and QoE parameters. This
model for routing data in a multi-hop manner. A ranking section discusses the different MAC-PHY standards and
model is adapted to select the next-hop node with the protocols designed for specific applications. The major
highest rank. Rank is allotted based on Trust Probability standard in use today is the IEEE 802.15.4 that covers the
(TP) that depends on the geographical distance between the physical layer specifications for the global application. It
current and next-hop nodes. An optimization problem is forms the basis of the ZigBee standard that is usually used
formed to select the optimal route with maximum TCP. in the smart living IoT scenarios. Additionally, the IEEE
The problem is solved with the help of the Dijkstra 802.15.6 standard is defined for the healthcare scenarios.
algorithm that determines the TCP value from a source The other standards used for specific application cases are
node to all the nodes in the network. The model offers the BLE, Long Range Wide Area Network (LoRaWAN), NB-
D2D communication in both Channel State Information IoT, and Near Field Communication (NFC). These provide
(CSI) aware and unknown condition to calculate the the physical layer as well as MAC specifications for the M-
minimum power required to transmit between D2D device IoT networks.
and BS. The IEEE 802.15.4 family of Low Rate Wireless
Personal Area Networks (LR-WPANs) was first approved
E. SUMMARY AND INSIGHTS
in 2003 [274]. Since then, several amendments have been
In this section, routing protocols for M-IoT has been made to the standard. There have been numerous region-
discussed. The existing research presents the routing specific amendments as well as application-specific
protocols from the perspective of energy-awareness, load amendments in the 2003 approved standard. The features
balancing, fault tolerance, mobility, delay awareness [268]. of the PHY-MAC standards, along with the amendments,
QoS–aware routing [269] for multimedia data is are tabulated in Table IX. This standard supports both, a
investigated and presented in [254]- [258]. Cross-layer star topology as well as a peer-to-peer topology. The MAC
protocols to improve routing strategies in terms of energy, layer resides above the PHY layer in the OSI model and
delay, throughput, and reliability [270] have been provides an interface between the PHY and the higher
presented in [38], [259]- [262]. Challenges and issues in layers [274], [275]. The MAC specifications for the IEEE
multicasting [271] and hop-count based routing schemes 802.15.4 (2003 release) envisages the use of a Carrier
have been discussed in [263]- [267]. However, to support Sense Multiple Access with Collison Avoidance
multimedia bandwidth-hungry and delay-sensitive (CSMA/CA) mechanism for Channel Access. The
applications, cross-layer and energy-aware protocols need CSMA/CA supports the beaconed mode as well as the non-

34

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

beaconed mode [276], [277]. The CSMA/CA mechanism used for healthcare applications. However, a new standard
for this standard and the IEEE 802.11 differs due to the from IEEE 802.15.6 was approved in 2012 for wireless
absence of a request to send/clear to send (RTS/CTS) body area networks (WBANs). The IEEE 802.15.4
frame exchange in the IEEE 802.15.4 family. supports a large range for monitoring the complete health
Additionally, in the IEEE 802.15.4a-2007 amendment, status of the user. One of the primary concerns with regards
the ALOHA is used for the channel access for the Ultra- to the healthcare applications in the M-IoT scenario is
Wide Band (UWB) [278]. The 802.15.4 standard serves as prolonging the lifetime of the nodes. The nodes may be
the PHY-MAC standard for a large range of applications surgically implanted. Thus, it becomes imperative that the
which requires a unique approach to each problem such as nodes have a large battery lifetime to prolong its use
in industrial systems. Additional applications include without causing inconvenience to the user.
multimedia surveillance, traffic management, advanced Fahmi et al. [285] provide a fuzzy logic-based sleep
healthcare, and environmental monitoring [279]. scheduling algorithm. This algorithm aims at optimizing
Therefore, the focus of this section remains the IEEE the sleep schedule of the nodes and introducing an adaptive
802.15.4 standard as most of the M-IoT scenarios are sleeping mechanism. The fuzzy logic uses an inference
operated by this standard. The application-oriented PHY- table that has a set of 81 rules to govern the sleeping times.
MAC approaches are discussed under the following sub- The energy savings are significant, which are reflected in
headings. the experimental results.
An intrinsic challenge faced by wireless networks is that
A. EXISTING WORK ON M-IOT APPLICATIONS IN THE
CONTEXT OF PHY-MAC PROTOCOLS of coexistence with multiple wireless networks. The
WBAN based M-IoT networks also face a similar
1) INDUSTRIAL APPLICATIONS
challenge, particularly in the IEEE 802.15.4 network.
The IEEE 802.15.4 standard has been identified as a
Deylami et al. [286] have presented an evaluation of the
suitable technology for industrial applications owing to the
coexisting IEEE 802.15.4 based networks for health
features it offers in this domain such as support for a peer-
monitoring applications. The coexistence of multiple
to-peer topology and beaconing in the MAC protocol. The
networks results in loss of data that may be critical,
different beacon intervals for the IEEE 802.15.4
especially in the time divided slot approach and GTS based
superframes leads to a scheduling problem in the network.
mechanisms. Therefore, a dynamic mechanism for
Toscano et al. [280] present a solution for the scheduling
resynchronizing the network clock according to the
problems in the multichannel networks. The key concept
network coordinator is required. To evaluate the security
underlying the Multichannel Superframe Scheduling
of the network by analyzing the efficient usage of the
(MSS) algorithm is utilizing the maximum superframe
bandwidth, authors in [287] foresee an exploitation attack
duration to determine the length of the timeslice and to
on the contention period during the MAC layer operation.
schedule all the superframes within the same timeslice on
The mechanism to remedy the problem is required to
different channels [280]. The experimental results reveal
enhance the reliability of the system, which is the
the beacons are perfectly aligned, and through the tracking
paramount QoS parameter. This includes an intelligent
of the parents, the synchronization is maintained. This is
backoff mechanism that offers a fair chance during the
not feasible in the time-division approach. Chen et al. [281]
Contention Access Period (CAP).
present a case for the use of IEEE 802.15.4 in the industrial
3) MULTIMEDIA CONTENT STREAMING INCLUDING
scenario. The experimental evaluation of the standard is SURVEILLANCE
carried out in the OMNET++/INET framework that tests The development of the advanced and cost-efficient
the large scale deployment of the nodes in an industrial Complementary Metal-Oxide Semiconductor (CMOS)
setup. The node energy efficiency and the goodput support sensors has led to the widespread growth of visual and
the argument for industrial applications. The Time audio content across many platforms. Its impact is
Division Multiple Access (TDMA) approach is used with profound in the IoT domain as well and has led to the
the Guaranteed Time Slot (GTS) that enhances reliability. development of the Wireless Multimedia Sensor Networks
The authors in [282] also propose a GTS based real-time (WMSNs) [288]. These WMSNs have found their
messaging service in the industrial environment. Kim et al. application in surveillance and telemedicine. The
in [283] allow a periodic synchronization of the node constraints these networks face are in terms of computing
network clocks using Enhanced Beacons (EBs). The power, energy supply, and memory. Additionally, they
synchronization allows efficient scheduling in the struggle with limited channel bandwidth and variable
proposed Time Slotted Channel Hopping (TISH) mode. capacity.
The overall result is the reduction in energy consumption Lin et al. [289] propose a system to mitigate the
and traffic collisions compliant with industrial standards. challenges of the limited network capabilities in the
2) HEALTHCARE APPLICATIONS multimedia framework. This involves a dynamic scheme to
Healthcare is one of the most important applications of adjust the beaconing interval and the superframe duration.
M-IoT. The PHY-MAC layer for the healthcare This dynamic approach helps in the network
applications is designed taking under consideration, the synchronization and efficient scheduling, thus, resulting in
QoS parameters like low latency and high data integrity enhanced transmission efficiency. The proposed method is
[284]. The IEEE 802.15.4 standard has been successfully

35

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

TABLE IX
DESCRIPTION OF PHY-MAC STANDARDS AND AMENDMENTS
Max Data
Name Year Frequency Band Locale Channels Modulation Security Salient Features
Rate
Global  In the 2.4 GHz a 32-chip
2.4 GHz 16 O-QPSK 250 kbps
ISM PN sequence is used for
signifying a symbol
868 MHz Europe 1 BPSK 20 kbps
802.15.4/ZigBee 2003  For the 868 and 915
MHz a 15-chip PN-
915 MHz America 10 BPSK 40 kbps sequence is used for the
spread spectrum
Global
2.4 GHz 16 O-QPSK 250 kbps
ISM  This release introduces
BPSK 20 kbps two optional PHY that
enhances the data rate
868 MHz Europe 1 O-QPSK 100 kbps  The channel pages
introduced in this PHY
802.15.4b 2006 PSSS 250 kbps allow the
accommodation of
BPSK 40 kbps
additional channels
915 MHz America 10 introduced by the
O-QPSK
250 kbps optional PHY
PSSS
Global
2.4 GHZ 16 O-QPSK 250 kbps
ISM
868 MHz Europe 1 PSSS 250 kbps
 Confidentiality  In addition to the
915 MHz America 10 PSSS 250 kbps  Integrity features of 2006 release,
 Authenticity an additional UWB and
249.6-  Replay attack chirp Signal PHY was
749.6 MHz protection introduced
802.15.4a 2007
0.11-27.24  Access control  The FCC cleared the use
UWB 3.1 - 4.8 16 BPM + BPSK of the 3.1-10.6 GHz
Mbps
GHz channel in 2002
Global  Three universally
6-10.6
supported mandatory
GHz
channels
250 kbps (64-
CS 2410-
14 DQPSK ary)
PHY 2486MHz
1 Mbps (8-ary)

 The O-QPSK uses a 16


O-QPSK chip- PN sequence for
spread spectrum which
maps 4 bits to 1 symbol
802.15.4c 2009 780 MHz PHY China 8 250 kbps  The MPSK uses the
MPSK same mapping but
modulates the chip
phases over the carrier
using PSK
2.4 GHz  2 additional PHY
Previous
868 MHz Global 250 kbps introduced
Standard
802.15.4d 2009 915 MHz -  9-stage shifter is used for
BPSK 20 kbps spread spectrum for
950 MHz Japanese GFSK
GFSK 100 kbps
 Authentication  Direct deployment in
QPSK, BPSK  Confidentiality GSM or LTE
NB-IoT 2016 LTE and GSM Bands Global 12 200 kbps
OFDMA  Integrity  Better range and
 Access control coverage
 Authentication
 Easy to deploy and
Wi-Fi 1997 2.4 GHz Global 11 QPSK 150+ Mbps  Confidentiality
access
 Integrity
868 MHz Europe  Highly immune to
interference
LoRaWAN 2012 12 CS PHY 50 kbps  Confidentiality
915 MHz America  Adaptive data rate and
Sub 1 GHz longer battery lifer
 Confidentiality
Global  Optimal for small data
BLE 2016 2.4 GHz 36 GFSK 1 Mbps  Integrity
ISM chunks
 Authenticity

Legend
O-QPSK Offset Quadrature Phase Shift Keying
BPSK Binary Phase Shift Keying
PN Sequence Pseudo Noise
PSSS Parallel Sequence Spread Spectrum
CS PHY Chirp Signal PHY
DQPSK Differential Phase Shift Keying
MPSK Multiple Frequency Shift Keying
GFSK Gaussian Frequency Shift Keying
Optional PHY

effective for a dynamic data load, as well. Pham et al. [290] deployment scenarios. The evaluation is a representative of
have presented an evaluation of the IEEE 802.15.4 the Universal Asynchronous Receiver Transmitter
standard for the image transmission applications real (UART) and Serial Peripheral Interface (SPI) based boards

36

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

TABLE X
EXISTING WORK ON PHY-MAC PROTOCOLS FOR M-IOT APPLICATIONS

Application Area Articles Year Description

[280] 2012 Scheduling mechanism using beaconing and super frames


[281] 2010 Feasibility study of IEEE 802.15.4 standard for LR-WAN using GTS
Industrial
[282] 2010 GTS based real-time messaging service for industrial scenario
[283] 2017 Enhanced beaconing based synchronization of network clock
[284] 2015 QoS based healthcare application for heterogeneous WBAN
[285] 2016 Fuzzy logic based rules for improving the network lifetime
IEEE 802.15.4

Healthcare Evaluation of coexisting M-IoT systems for healthcare systems using advanced scheduling
[286] 2012
mechanism

[287] 2011 Intelligent backoff mechanism for CAP to tackle scheduling attacks
Dynamic mechanism to adjust the beaconing interval and the super frame duration to
[288] 2011
improve transmission efficiency
Multimedia
Data compression and block interleaving scheme for improved data integrity and
PHY-MAC Protocols for M-IoT

[289] 2011
evaluation in UART and SPI boards
Improved reliability in coexisting IEEE 802.15.4 and 802.15.3 systems by efficient
Military [291] 2014
transmission scheduling of the super frames

Precision Fine tuning of MAC parameters and adaptive sampling for improving the data resolution
[292] 2015
Agriculture in heterogeneous agricultural management system
ZigBee

Home ZigBee and IEEE 802.15.4 coexistence evaluation for home automation systems with
[293] 2010
Automation support for multimedia sensors

[295],
Channel observation-based mechanisms adaptively increases and decreases the contention
[296], 2018 -2019
parameters to tackle the blindness of currently implemented CSMA/CA
[297]
IEEE 802.11

Deep reinforcement learning based performance optimization of channel observation–


[298] 2019
Multimedia based MAC protocols in dense WLANs
Q-learning-enabled channel access in next-generation dense wireless networks for IoT-
[299] 2019
based eHealth systems
ML-enabled distributed channel access (MEDCA) mechanism to optimize the
[300] 2019
performance of channel access in multimedia-based WLANs

NB-IoT communication approach that dynamically creates a group of devices which are
[302] 2018
subscribed to receive multimedia services in a multicast transmission
NB-IoT

Inner loop and outer loop link adaption that copes with block error ratio and coordination
[303] 2017
Multimedia between ACM and repetition numbers

D2D communication as an opportunistic communication with improved link quality to


[304] 2018 upload NB-IoT users critical data to BS. The proposed optimization aims to improve end-
to-end delay and packet delivery ratio
BLE

Voice
[25] 2016 BlueVoice, an application for voice communication over BLE
Communication

for surveillance. The authors present a compression IEEE 802.15.3 standard. The reliability is the key
scheme for Joint Photographic Experts Group (JPEG) performance indicator for the applications.
format image data as well as a block interleaving scheme 5) PRECISION AGRICULTURE
that enhances the reconstructive accuracy after encoding The implications of M-IoT in the agricultural field are
the images. The authors identify the possible bottlenecks immense. The data rates for the various metrics that are
that induce higher latency. sensed vary greatly amongst each other. Additionally, the
4) MILITARY APPLICATIONS priority of each data is different, so the channel access
Mendes et al. [291] propose a cross-layer and cross mechanism has to adapt accordingly. Kone et al. [292]
standard methodology for an improved surveillance system propose a fine-tuned MAC layer for precision agricultural
in a military application. The proposed method involves applications in the IEEE 802.15.4 standard. Precision
support for the multimedia sensors as well as auxiliary agriculture is closely monitored and controlled agricultural
sensors for improved enemy movement detection. The practice. The proposed method involves the selection of
proposed method involves the superframe synchronization optimal values for the sampling frequency based on the
for improved transmission reliability by allowing cross- recorded parameter. Additionally, the MAC parameters
standard compatibility between the IEEE 802.15.4 and like the minimum value of the backoff exponent as well as

37

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

the maximum number of backoffs. The proposed method dynamically creates a group of devices that are subscribed
demonstrates the increased sampling frequency for to receive multimedia services in a multicast transmission.
applications that require higher resolution, thus, improving To enhance the coverage area, the repetition of control and
the granularity. data transmission signals has been considered. The
B. ZIGBEE STANDARD Adaptive Coding and Modulation (ACM) scheme and
ZigBee is another standard that is used in the M-IoT repetition numbers are in need of link adaption for NB-IoT
scenario. It is particularly utilized in the consumer systems. However, traditional link adaption techniques
electronics sphere for home automation. However, the without repetition numbers are not applicable to NB-IoT
ZigBee and IEEE 802.15.4 can be used interoperably. systems. Yu et al. [303] proposed an inner loop and outer
Some applications with higher security requirements loop link adaption that copes with block error ratio and
utilize ZigBee while coexisting with the IEEE 802.15.4 coordination between ACM and repetition numbers. The
standard. Han et al. [293] explore such a scenario. The direct communication link between user and BS usually
authors present a planned overview of automated systems does not satisfy QoS for transmitting vital data. Li et al.
for efficiently deploying smart living systems. [304] exploit D2D communication as an opportunistic
communication with improved link quality to upload
C. IEEE 802.11 STANDARD critical data to BS. The proposed optimization aims to
Institute of Electrical and Electronics Engineers created improve end-to-end delay and packet delivery ratio. NB-
the first standard for Wireless Local Area Network IoT is an emerging technology that yet needs to be explored
(WLAN). The standards in the IEEE 802.11 family are also in-depth for deployment.
known as Wi-Fi. These standards provide PHY and MAC
E. BLUETOOTH LOW ENERGY
protocols for M-IoT devices. The key characteristics of this
standard can be seen in Table IX. From the day first, BLE is also known as Bluetooth Smart was introduced
WLANs have been facing the challenge of efficient MAC in Bluetooth 4.0. BLE is a short-range PHY-MAC
layer resource allocation while accessing the channel communication protocol for low power battery operated
[294]. CSMA/CA is one of the popular collision avoidance devices [305]. BLE is mostly used for scalar parametric
mechanisms used by the MAC layer. In CSMA/CA, a monitoring applications. Multimedia communication using
randomized backoff mechanism is performed by the BLE has not been yet investigated in-depth in IoT, as BLE
devices before accessing the channel resources. However, is only suitable for a small chunk of data. Gentili et al. [25]
a blind exponential increase and reset of contention values proposed BlueVoice, an application for voice
in this backoff mechanism induce performance communication over BLE. However, results in the
degradation. proposed study have not been compared with other PHY-
Ali et al. proposed solutions in [295], [296], [297] to MAC protocols.
tackle the blindness of currently implemented CSMA/CA.
F. LONG RANGE WIDE AREA NETWORK
Their proposed channel observation-based mechanisms
adaptively increase and decrease the contention LoRaWAN developed by LoRa Alliance is another
parameters. Besides, ML-based techniques have been LPWA communication standard that provides PHY-MAC
playing a vital role in the performance optimization of protocol for IoT applications. LoRaWAN utilizes LoRa
MAC layer resource allocation mechanisms [298]. Such modulation based on Chrip Spread Spectrum (CSS) and
ML-enabled techniques are also utilized for other low- ALOHA medium access mechanism. To the best of our
power energy-constrained networks of IoT applications, knowledge, no substantial work has been done in M-IoT
such as smart healthcare systems [299]. In the context of exploiting LoRaWAN.
M-IoT, an ML-enabled distributed channel access
(MEDCA) mechanism is proposed in [300]. The proposed G. SUMMARY AND INSIGHTS
MEDCA mechanism utilizes Q learning algorithm to
The PHY-MAC layer is responsible for the resource
optimize the performance of channel access in multimedia-
allocation and management of hardware and networking
based WLANS (that is IEEE 802.11e).
resources. The IEEE 802.15.4 standard is the most widely
D. NARROW-BAND IOT utilized standard for the M-IoT deployment. The various
NB-IoT is one of the Low Power Wide Area (LPWA) authors present solutions for improving reliability and
technologies released by the 3rd Generation Partnership reducing the delay by synchronizing the network clocks
(3GPP). It is designed for heterogeneous IoT devices to periodically. The MAC protocols are modified according
achieve improved spectrum efficiency, extended, and in- to the application QoS. Various proposed work on PHY-
depth coverage. The key feature of NB-IoT is that it can be MAC protocols mentioned in Table IX has been presented
directly deployed in the Global System for Mobile in this section. ML and DL based resource allocation and
communication (GSM) or LTE spectrum [301]. However, management techniques are yet to be explored for M-IoT
the NB-IoT device has to continuously monitor the data applications. Security is another critical challenge in the
transmission channel for service announcements and wireless medium. Efficient authentication, authorization,
updates that waste energy resources. Tsoukaneri et al. and validation technique are required for critical M-IoT.
[302] present an NB-IoT communication approach that Table X classifies and summarizes this section.

38

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Security and Privacy

Cross Layer Protocols 5G and Beyond 5G


ML and DL Routing Tactile Internet
Protocols Molecular
Scalability Communication

Efficient Routing Interoperability


Protocol

Multimedia
Machine
Efficient Future Research Applications
Intelligence Feature
Channel Access Directions in M-IoT Augmented and
Q-Learning Extraction
MAC Protocol System Virtual Reality
Deep Learning
in M-IoT

Lightweight Data
Computation Prioritization
Compression
Energy-Awareness Encoding/
Energy Harvesting
Decoding Real-time
Awareness
Green Processing
Communication

QoE for M-IoT


Systems

FIGURE 17. Overview of the open issues, challenges, and future research directions for M-IoT systems.

VIII. FUTURE RESEARCH DIRECTIONS spectrum scarcity and limited power resources. SDN based
middleware is extensively studied with regard to software-
In spite of the plethora of research activities and defined IoT architectures [306], [307]. SDNs addresses the
incredible progress in recent years, M-IoT still possesses hardware and reconfigurability limitations of IoT devices
many open issues that are still waiting to be resolved. The [308]. Publish/subscribe is a communication mechanism
main goal of M-IoT includes carrying out multimedia for distributed IoT systems [309], [310]. In the
communication with maximum QoE in terms of packet publish/subscribe model, the user does not have to be in
delivery ratio, throughput, and extending network lifetime direct contact with the service provider. Software-defined
while minimizing energy expenditure and preventing publish/subscribe based agents for M-IoT architecture
connectivity degradation. These goals can be achieved by offers new opportunities to add scalability and
employing efficient data aggregation, interoperable and interoperability in the network [311]. However, no
scalable architecture, efficient feature extraction, dedicated work has been done to devise SDN based
intelligent routing, and adaptive MAC protocols, and publish/subscribe M-IoT architecture. There is a need to
managing energy while maximizing computing. explore SDNs in the context of standardizing M-IoT
Additionally, there are restrictions on IoT devices to be architecture.
miniscule with the capability of mobility and multiple
B. FEATURE EXTRACTION
communication interfaces. Therefore, there are extensive
Multimedia devices generate a huge amount of data that
research issues that should further be explored in the field
comprise structured and unstructured data. The processing
of M-IoT. Fig. 17 depicts the major areas that demand
of such amount of unstructured data over an energy-
novel contributions and innovations. In this section, a wide
constrained network requires the transmission of only
range of research issues are delineated for future
meaningful information.
exploration.
An Intelligent feature extraction mechanism is required
A. INTEROPERABLE AND SCALABLE to identify and classify multimedia data with minimum
ARCHITECTURE energy consumption [312], [313]. DL addresses the
M-IoT requires redefined efficient network architecture limitations of ML to process a huge amount of data [314].
to offer scalability and interoperability for multiple DL offers proficient multimedia feature extraction models
multimedia heterogeneous devices while considering the [315], [316]. Extracting semantic from multimedia data

39

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

could transform unstructured data into structured, indexed multimedia applications, applications dependent software-
data for efficient processing [317]. Implementing DL over defined computing architectures are required to offer
SDNs and adding semantics to multimedia data are yet to interoperability in HetNets. To increase network
be explored for intelligent multimedia feature extractions. throughput with minimum energy utilization, the
intelligent transmission of only meaningful information to
C. DATA PRIORITIZATION cloud and fog/edge is required for processing.
Prioritizing multimedia data addresses a lot of issues G. QoE RELATED RESEARCH DIRECTION
related to energy [318], scheduling [319], video streaming User satisfaction of multimedia content in M-IoT is
[320], memory [321], improving PLR , enhancing QoS measured by exploiting QoE subjective metrics. Recent
[322], security [323], and reduce network latency [324]. A studies of QoE evaluation for M-IoT applications are
large number of M-IoT applications mentioned in the conducted with primary QoE metrics that are packet loss,
previous sections are real-time delay-sensitive that require MOS, DMOS, and user satisfaction. Other QoE metrics
multimedia data prioritization. Multimedia applications such as buffering time, data rate, interruption time, and
require ubiquitous transmission for which AI-based data failure rate should also be used for evaluation of M-IoT (as
classification and priority optimization in M-IoT should be discussed in [334]). Most of the work on M-IoT considers
extensively studied concerning the requirements of the network performance metrics (QoS metrics) that are jitter,
application. end-to-end delay, bit error rate, and frame loss. Both QoS
D. EVENT PROCESSING and QoE metrics should be jointly evaluated to achieve
Events are defined as real-world occurrences that reveal better multimedia quality and network services [335].
over space and time. A huge volume of event content is H. SECURITY AND PRIVACY
being captured in multimedia, of which YouTube videos, The transmission of bandwidth-hungry and delay-
TV shows, and animations cover 60% of the Internet traffic sensitive multimedia applications over the scares spectrum
[325]. The tremendous increase in real-life events captured requires protection from eavesdroppers and threats.
in multimedia requires event analysis to associate metadata Confidential industrial and health multimedia data needs
with events for efficient query processing. Event detection P2P, MP2P, and P2MP encryption. Very partial research
[326], feature representation [327], and adding semantics has been conducted on securing multimedia transmission
[328], is known as event mining [329]. An intelligent event over the IoT network [336], [337]. There are several threats
mining in audio, videos, and images are required in M-IoT that compromise the user’s data and privacy [59]. New
for efficient resource utilization to process the required approaches should be adopted to secure the network from
service with minimum delay. any attack. Multimedia is content-based data [76].
E. COMPRESSION AND ENCODING/DECODING However, content-aware secure transmission of
TECHNIQUES FOR M-IOT multimedia data over M-IoT has not been studied. The
M-IoT necessitates compression techniques to become authentic distribution of multimedia content is also
more vigorous with low complexity and to produce low required to verify legal copyrights.
bandwidth output while adhering to limited network and The miniature M-IoT devices are computational and
spectrum resources. Compression techniques are energy-constrained. Thus, lightweight data cryptography is
extensively studied in the context of multimedia required for secure communication. AI offers to secure
transmission over wireless networks in [330], [331]. multimedia data at the cost of high power consumption due
However, no enthusiastic work has been done on to complex algorithms, that are not feasible to implement
compression or encoding techniques for the transmission on IoT devices [338], [339]. Fog/Edge enables IoT devices
of multimedia data over the M-IoT network. There is a to perform computationally better and faster. Fog/Edge
need to explore the coding methodologies related to offers to implement blockchain-based secure and
multimedia services in M-IoT while considering the power transparent systems [340], [341]. However, security issues
and interface constraints. related to multimedia data has not been explored in detail.
F. COMPUTATION RELATED ISSUES
I. ENERGY-AWARE AND GREEN COMMUNICATION
The difference between multimedia data and scalar data Energy is a scarce resource. Bandwidth and power-
has been shown in Table I. Processing and analysis of such hungry multimedia applications require vast energy
high power consumption, and processing data requires resources for their transmission. Thus, to transmit
efficient computing models for minimizing the network multimedia data over IoT, energy-aware and energy
overheads and energy consumptions [332]. Multimedia harvesting methods need to be explored. There are many
processing is dependant on multiple factors, i.e., feature energy harvesting solutions for harvesting energy from the
extraction, prioritization, network coding, compression, environment. These solutions can assist in prolonging
efficient routing, and MAC protocols. The limitation of network life and promoting green communication [342].
cloud computing and compensation offered by Fog/Edge SDNs provide a better softwarization and virtualization
computing is detailed in the previous sections [333]. approach to manage hybrid energy resources in future
However, minimal work has been performed in SDNs as communication networks [343]. To the best of our
multimedia computing in IoT. Due to the diverse nature of knowledge, SDNs are not studied for energy harvesting

40

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

approaches to transmit multimedia content over the IoT (B5G). ML, DL, Quantum Computing (QC), and Quantum
network. ML (QML) are considered as a core enabler of Sixth
J. ROUTING AND MAC RELATED ISSUES Generation (6G) or B5G [359]. Gigahertz (GHz) and
The routing and MAC layer protocols for M-IoT exploit Terahertz (THz) frequencies provide solutions to
QoS metrics to make their routing or medium access bandwidth scarcity and high date rates to deliver
decisions. Cross-layer protocols provide multi-layer multimedia content [360]. All these areas are yet to
metrics for better decisions to select route and access investigate and explored for integrating M-IoT with 5G and
medium for multimedia data in a wireless network [344], 6G.
[345]. Cross-layer metrics evaluation for user satisfaction M. AUGMENTED AND VIRTUAL REALITY IN M-IOT
of multimedia data (QoE) has not been thoroughly Multimedia Augmented Reality (AR) and Virtual
explored [346]. Selecting route and medium by evaluating Reality (VR) in IoT will reveal many hidden and open the
cross-layer and mapping them with the user’s QoE will close doors for humanity [361]. 5G and B5G will enable
enhance the performance and lifetime of the M-IoT user-friendly wireless AR and VR interfaces. AR and VR
network. in M-IoT will revolutionize the health, industrial, and
D2D communication provides an efficient routing and education sector [362]. It could be helpful for several
medium access extension for the delivery of multimedia patients suffering from immutable diseases, education and
content in a smart city [347], [348], [349]. Due to training, guidance and assistance, construction and
bandwidth scarcity and delay the urgency of multimedia architecture, and games. In brief, it could expedite the
data, D2D supports a proficient mechanism to reduce PLR, development of the smart city [363]. To achieve the
latency, and power consumption [350]. D2D development of a smart city, the requirements of end-user
communication as a routing and medium extension can be should be known, preferred, and satisfied by the interaction
investigated for M-IoT. of end-user, telecommunication industry, content
Lightweight ML algorithms like reinforcement learning developers, and research scientists.
do not consume a significant amount of energy. IoT N. TACTILE INTERNET
devices equipped with these ML approaches for efficient Certain real-time application areas of M-IoT such as
route and medium selection. DL learning algorithms could robotic surgery, remote physical interaction, teleoperation,
be implemented on edge devices to extract multimedia automation industry, and AR/VR require even minor tactile
features and map them with routing and MAC metrics to sensing information that occurs due to the interaction
achieve better user’s QoE of multimedia content in IoT. To between the application and the environment [364]. IEEE
the best of our knowledge, no substantial amount of work recently launched activities to standardize tactile Internet
has been proposed in this domain. (IEEE P1918.1) [365]. The requirements of tactile
K. MULTIMEDIA APPLICATIONS AND SMART CITY information are ultra-low latency in milliseconds. URLLC
M-IoT applications support a wide variety of seems to satisfy these requirements. There are a lot of
applications, assisting in building a smart city by providing research areas from the perspective of the tactile Internet
varied networks and architectures [351], [352]. These that is yet to be studied in detail. Compression of tactile
applications contribute a major portion in the industry, information, intelligent and scalable network traffic
agriculture, road management systems, and security (as engineering for audio and video, and edge caching and
discussed comprehensively in section III). However, work computing for AR/VR has received very little attention
to secure and authenticate voice assistant systems has not [366], [367], [368]. Efficient routing and MAC protocols
been studied. The collaboration of these applications in the for tactile information are in need.
smart city requires integration in 5G. The integration of M- O. MOLECULAR COMMUNICATION
IoT has not been studied significantly. The ability to integrate all the five sensory features of
L. 5G AND BEYOND 5G humans that are olfactory (smell), gustatory (taste), tactile
The future 5G of wireless cellular communication is (touch), ocular (sight), and hearing (audio) in information
expected to lay the basis of an intelligent network for and transmit is known as Human Bond Communication
multimedia communication in smart cities. Massive (HBC) [369]. In humans, the exchange of information is
Mulitple-Input-Multiple-Output (MIMO) systems for based on the synthesis, transformation, emission,
spectral efficiency [353], Non-Orthogonal Multiple Access propagation, and reception of molecules through
(NOMA) for multimedia broadcast services [354]- [355], biochemical and physical processes. In telecommunication
micro and femtocells to increase cellular capacity, Ultra- engineering, this information exchange is classified as
Reliable Low-Latency Communication (URLLC) to molecular communication [370]. With the emergence of
achieve low latency for multimedia applications [356]- NanoThings, molecular communication is the key research
[357], and NB-IoT for machine type communication are areas to revolutionize M-IoT [371].
few solutions to achieve objectives of 5G [358].
However, a fully intelligent on-demand self- IX. CONCLUSION
reconfigurable network to enhance many folds in the The evolving Multimedia Internet-of-Things (M-IoT)
services and performance will be released in Beyond 5G has promoted several innovative applications, aiming to

41

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

improve the quality of life by connecting numerous smart [6] T. Harwood, "Postscapes," [Online]. Available:
devices through emerging enabling technologies. https://www.postscapes.com/internet-of-things-history/.
[Accessed 29 11 2018].
Multimedia communication in IoT can support countless
[7] "Statista," [Online]. Available:
applications. The objective of this survey is to highlight the
https://www.statista.com/statistics/471264/iot-number-of-
overview of M-IoT and the importance of M-IoT connected-devices-worldwide/. [Accessed 08 November 2018].
applications. The main issues while designing M-IoT [8] "IEEE Spectrum," [Online]. Available:
architectures, protocols, and computing approaches are https://spectrum.ieee.org/tech-talk/telecom/internet/popular-
explored to provide stable IoT architecture to support internet-of-things-forecast-of-50-billion-devices-by-2020-is-
maximum QoE. However, it is challenging to achieve outdated. [Accessed 08 November 2018].
because of constraints imposed by multimedia content, [9] Q. Wang, Y. Zhao, W. Wang, D. Minoli, K. Sohraby, H. Zhu and
B. Occhiogrosso, "Multimedia IoT Systems and Applications," in
which distinguish it from traditional IoT. Various IEEE Global Internet of Things Summit (GIoTS), Geneva,
application-use cases were presented to illustrate how M- Switzerland, 2017.
IoT can revolutionize the world. Various requirements and [10] D. Minoli, Building The Internet of Things with IPv6 and MIPv6,
proposed solutions on Quality-of-Experience (QoE) for M- New Jersey: Wiley & Sons, 2013.
IoT on their subjective and objective-based metrics have [11] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari and M.
been presented. Moreover, the relation between Ayyash, "Internet of Things: A Survey on Enabling Technologies,
multimedia content, cloud computing, big data analytics, Protocols, and Applications," IEEE Communications Surveys &
Tutorials, vol. 17, no. 4, pp. 2347-2376, 2015.
event processing, fog/edge computing, multimedia data
[12] T. Qiu, N. Chen, K. Li, M. Atiquzzaman and W. Zhao, "How Can
coding, feature extraction, and SDNs have been discussed. Heterogeneous Internet of Things Build Our Future: A Survey,"
Also, this article provides a comprehensive survey of IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp.
various routing and Medium Access Control protocols 2011-2027, thirdquarter 2018.
(MAC) used for M-IoT. Finally, this article points out the [13] M. A. Hoque, M. Seikkinen and J. K. Nurminen, "Energy
open and potential research areas that need to be solved in Efficient Multimedia Streaming to Mobile Devices – A Survey,"
IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp.
future M-IoT systems. This article should deliver a sound 579-597, First Quarter 2014.
basis for researchers to understand issues and challenges in
[14] J. Huang, Q. Duan, Y. Zhao, Z. Zheng and W. Wang, "Multicast
M-IoT. Routing for Multimedia Communications in the Internet of
Things," IEEE Internet of Things Journal, VOL. 4, NO. 1, vol. 4,
ACKNOWLEDGMENT no. 1, pp. 215-224, February 2017.
This research was supported in part by the Brain Korea [15] S. A. Alvi, G. A. Shah and W. Mahmood, "Energy efficient green
routing protocol for Internet of Multimedia Things," in 2015 IEEE
21 Plus Program (No. 22A20130012814) funded by the Tenth International Conference on Intelligent Sensors, Sensor
National Research Foundation of Korea (NRF), in part by Networks and Information Processing (ISSNIP), Singapore, 2015.
the MSIT (Ministry of Science and ICT), Korea, under the [16] M. A. Mahmud, A. Abdelgawad and K. Yelamarthi, "Energy
ITRC (Information Technology Research Center) support Efficient Routing for Internet of Things (IoT) Applications," in
program (IITP-2019-2016-0-00313) supervised by the IEEE International Conference on Electro Information
IITP (Institute for Information & Communications Technology (EIT), Lincoln USA, 2017.
Technology Planning & Evaluation), and in part by Basic [17] H. Shen and G. Bai, "Routing in wireles smultimedia sensor
networks:A survey and challenges ahead," Journal of Network
Science Research Program through the National Research and Computer Applications, vol. 71, pp. 30-49, 2016.
Foundation of Korea (NRF) funded by the Ministry of [18] H. S. Kim, J. Ko, D. E. Culler and J. Paek, "Challenging the IPv6
Education (2018R1D1A1A09082266). Routing Protocol for Low-Power and Lossy Networks (RPL): A
Survey," IEEE Communications Surveys and Tutorials, vol. 19,
REFERENCES no. 4, pp. 2502-2525, Fourthquarter 2017.
[19] H. Shen and G. Bai, "Routing in wireless multimedia sensor
[1] A. Luigi, l. Antonio and M. Giacomo, "The Internet of Things: A networks: A survey and challenges ahead," Journal of Network
survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 28 and Computer Applications, vol. 71, pp. 30-49, August 2016.
October 2010. [20] M. Z. Hasan, H. Al-Rizzo and F. Al-Turjman, "A Survey on
[2] P. P. Ray, "A survey on Internet of Things architectures," Journal Multipath Routing Protocols for QoS Assurances in Real-Time
of King Saud University - Computer and Information Sciences, Wireless Multimedia Sensor Networks," IEEE Communications
vol. 30, no. 3, pp. 291-319, 2018. Surveys & Tutorials, vol. 19, no. 3, pp. 1424 - 1456, January 2017.
[3] Y. Bin Zakaria, H. Yu, M. K. Afzal, M. Husain Rehmani and O. [21] R. Singh, B. K. Rai and S. K. Bose, "A Joint Routing and MAC
Hahm, "Internet of Things (IoT): Operating Systems, applications Protocol for Transmission Delay Reduction in Many-to-One
and Protocols Design, and Validation Techniques," Future Communication Paradigm for Wireless Sensor Networks," IEEE
Generation Computer Systems, vol. 88, pp. 699-706, November Internet of Things Journal, vol. 4, no. 4, pp. 1031-1045, Aug.
2018. 2017.
[4] S. A.Alvi, B. Afzal, G. A. Shah, L. Atzori and W. Mahmood, [22] A. Loshkarev and A. Markhasin, "Performance Modeling and
"Internet of multimedia things: Vision and Challenges," Ad Hoc Optimization of Flexible QoS-Guaranteed Multifunctional MAC
Networks, vol. 33, pp. 87-111, April 2015. for Rural Profitable Ubiquitous 5G IoT/M2M Systems," in
International Conference on Information Science and
[5] M. Novak, "paleofuture," [Online]. Available:
Communications Technologies (ICISCT), Tashkent, 2016.
https://paleofuture.gizmodo.com/nikola-teslas-incredible-
predictions-for-our-connected-1661107313. [Accessed 29 11 [23] X. Jian, Y. Liu, Y. Wei, X. Zeng and X. Tan, "Random Access
2018]. Delay Distribution of Multichannel Slotted ALOHA With Its

42

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Applications for Machine Type Communications," IEEE Internet Multimedia Things," IEEE Transactions on Circuits and Systems
of Things Journal, vol. 4, no. 1, pp. 21-28, Feb. 2017. for Video Technology, vol. 29, no. 3, pp. 610-624, March 2019.
[24] N. Abuzainab, W. Saad, C. S. Hong and H. . V. Poor, "Cognitive [41] Z. Li, H. Huang and S. Misra, "Compressed Sensing via
Hierarchy Theory for Distributed Resource Allocation in the Dictionary Learning and Approximate Message Passing for
Internet of Things," IEEE Transactions on Wireless Multimedia Internet of Things," IEEE Internet of Things Journal,
Communications, vol. 16, no. 12, pp. 7687-7702, Dec. 2017. vol. 4, no. 2, pp. 505-512, April 2017.
[25] M. Gentili, R. Sannino and M. Petracca, "BlueVoice: Voice [42] R. Pereira and E. Pereira, "Video Streaming: H.264 and the
communications over Bluetooth Low Energy in the Internet of Internet of Things," in IEEE International Conference on
Things scenario," Computer Communications, Vols. 89-90, no. 1, Advanced Information Networking and Applications Workshops,
pp. 51-59, 2016. Gwangiu, South Korea, 2015.
[26] L. Guo, Z. Ning, Q. Song, L. Zhang and A. Jamalipour, "A QoS- [43] A. Sammoud and T. Elarabi, "Real-Time Streaming Challenges in
Oriented High-Efficiency Resource Allocation Scheme in Internet of Video Things (IoVT)," in IEEE International
Wireless Multimedia Sensor Networks," IEEE Sensors Journal, Symposium on Circuits and Systems (ISCAS), Baltimore, MD,
vol. 17, no. 5, pp. 1538-1548, March 2017. USA, 2017.
[27] R. Zhang, M. Wang, X. Shen and L. -l. Xie, "Probabilistic [44] D. Grois, D. Marpe, A. Mulayoff, B. Itzhaky and O. Hadar,
Analysis on QoS Provisioning for Internet of Things in LTE-A "Performance Comparison of H.265/MPEG-HEVC, VP9, and
Heterogeneous Networks with Partial Spectrum Usage," Internet H.264/MPEG-AVC Encoders," in Picture Coding Symposium
of Things Journal, vol. 3, no. 3, pp. 354-365, 2015. (PCS), San Jose, CA, USA, 2013.
[28] A. Brogi and S. Forti, "QoS-Aware Deployment of IoT [45] A. Kumari, S. Tanwar, S. Tyagi, N. Kumar, M. Maasberg and K.-
Applications Through the Fog," IEEE Internet of Things Journal, K. R. Choo, "Multimedia big data computing and Internet of
vol. 4, no. 5, pp. 1185-1192, Oct. 2017. Things applications: A taxonomy and process model," Journal of
[29] N. kouka, A. thalajoui and A. Meddeb, "QoS Lowpan for Internet Network and Computer Applications, vol. 124, pp. 169-195, Dec
of Things," in 13th International Conference on New 2018.
Technologies for Distributed Systems, 2016. [46] O. Salman, I. Elhajj, A. Chehab and A. Kayssi, "IoT survey: An
[30] H. Khodkari, S. G. Maghrebi and A. Asosheh, "Assurance of QoS SDN and fog computing perspective," Computer Networks, vol.
in the Integration of Cloud Services and Internet of Things," in 143, pp. 221-246, October 2018.
International Symposium on Networks, Computers and [47] R. Patel, V. K. Dabhi and H. . B. Prajapati, "A Survey on IoT
Communications (ISNCC), Marrakech, Morocco, 2017. based Road Traffic Surveillance and Accident Detection System,"
[31] A. Karaadi, L. Sun and I.-H. Mkwawa, "Multimedia in IEEE International Conference on Innovations in Power and
Communications in Internet of Things QoT or QoE?," in 2017 Advanced Computing Technologies, Vellore, 2017.
IEEE International Conference on Internet of Things (iThings) [48] A. Grau, "Can you trust your fridge?," IEEE Spectrum, vol. 52,
and IEEE Green Computing and Communications (GreenCom) no. 3, pp. 50-56, 2015.
and IEEE Cyber, Physical and Social Computing (CPSCom) and [49] M. . S. Obaidat, S. . P. Rana, T. Maitra, D. Giri and S. Dutta,
IEEE Smart Data (SmartData), Exeter, UK, 2017. "Biometric Security and Internet of Things (IoT)," in Biometric-
[32] X. Huang, K. Xie, S. Leng, T. Yuan and M. Ma, "Improving Based Physical and Cybersecurity Systems, SpringerLink, 2018,
Quality of Experience in multimedia Internet of Things leveraging pp. 477-509.
machine learning on big data," Future Generation Computer [50] H. Geng, Internet of Things and Data Analytics Handbook, John
Systems, vol. 86, pp. 1413-1423, 2018. Wiley and Sons., Jan 2017.
[33] W. Wang and Q. Wang, "Price the QoE, Not the Data: SMP- [51] R. P. Barbosa Mota, "A RFID QoS Mechanism for IoT Tracking
Economic Resource Allocation in Wireless Multimedia Internet Applications," in International Symposium on Wireless and
of Things," IEEE Communications Magazine, vol. 56, no. 9, pp. pervasive Computing (ISWPC), Taipei, Taiwan, 2013.
74-79, 2018.
[52] J. S. Silva, P. Zhang, T. Pering, . F. Boavida, . T. Hara and . N. C.
[34] I. Bennis, H. Fouchal, K. Piamrat and M. Ayaida, "Efficient Liebau, "People-Centric Internet of Things," IEEE
queuing scheme through cross-layer approach for multimedia Communications Magazine, vol. 55, no. 2, pp. 18-19, 2017.
transmission over WSNs," Computer Networks, vol. 134, pp. 272-
282, 2018. [53] F. Antar, . M. Jain, H. Dugyala, D. Nelluri and . R. M. Zaragoza,
"Reliability Improvements to Healthcare Patient RFID Tracking
[35] M. Aazam, M. St-Hilaire, C. H. Lung and I. Lambadaris, with Multiple Tags," in 2017 IEEE SmartWorld, Ubiquitous
"MeFoRE: QoE based Resource Estimation at Fog to Enhance Intelligence & Computing, Advanced & Trusted Computed,
QoS in IoT," in IEEE International Conference on Scalable Computing & Communications, Cloud & Big Data
Telecommunications (ICT), Thessaloniki, 2016. Computing, Internet of People and Smart City Innovation
[36] Y. Ikeda, S. Kouno, A. Shiozu and K. Noritake, "A Framework of (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), San
Scalable QoE Modeling for Application Explosion in the Internet Francisco, CA, 2017.
of Things," in IEEE 3rd World Forum on Internet of Things (WF- [54] D. Yang and Q. Wang, "The Study on the Application of RFID-
IoT), Reston, VA, 2016. Based Mobile Payment to the Internet of Things," in 2011
[37] G. Xu, C. H. Ngai and J. Liu, "Ubiquitous Transmission of International Conference on Multimedia Technology, Hangzhou,
Multimedia Sensor Data in Internet of Things," IEEE Internet of China, 2011.
Things Journal, vol. 5, no. 1, pp. 403-414, Feb 2018. [55] X. Jia, . Q. Feng, T. Fan and Q. Lei, "RFID technology and its
[38] S. Rani, S. Hassan Ahmed, R. Talwar, J. Malhotra and H. Song, applications in Internet of Things (IoT)," in International
"M-IoT: A Reliable Cross Layer Protocol for Internet of Conference on Consumer Electronics, Communications and
Multimedia Things," IEEE Internet of Things Journal, vol. 4, no. Networks , Yichang, China, 2012.
3, pp. 832-839, June 2017. [56] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal and Q. Z. Sheng,
[39] P. Devi and . W. S. Ravindra, "Cross Layer Protocol for "IoT Middleware: A Survey on Issues and Enabling
Bandwidth-hungry applications in IoT network," in Second Technologies," IEEE Internet of Things Journal, vol. 4, no. 1, pp.
International Conference on Inventive Communication and 1-20, Feb. 2017.
Computational Technologies (ICICCT), Coimbatore, India, 2018. [57] L. Davoli, L. Belli, A. Cilfone and G. Ferrari, "From Micro to
[40] K. Thiyagarajan, R. Lu, K. El-Sankary and H. Zhu, "Energy- Macro IoT: Challenges and Solutions in the Integration of IEEE
Aware Encryption for Securing Video Transmission in Internet of

43

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

802.15.4/802.11 and Sub-GHz Technologies," IEEE Internet of Networks," IEEE Intelligent Systems, vol. 25, no. 2, pp. 40 - 47,
Things Journal, vol. 5, no. 2, pp. 784-793, April 2018. May 2010.
[58] P. Hu, H. Ning, L. Chen and M. Daneshmand, "An Open Internet [77] A. M. Eskicioglu, "Multimedia security in group
of Things System Architecture based on Software-defined communications: recent progress in key management,
Device," IEEE Internet of Things Journal (Early Access), 2018. authentication, and watermarking," Multimedia Systems, vol. 9,
[59] J. E. Siegel, S. Kumar and S. E. Sarma, "The Future Internet of no. 3, p. 239–248, September 2003.
Things: Secure, Efficient, and Model-Based," IEEE Internet of [78] D. Goel, N. Pahal, P. Jain and S. Chaudhury, "An Ontology-
Things Journal, vol. 5, no. 4, pp. 2386-2398, Aug. 2018. Driven Context Aware Framework for Smart Traffic Monitoring,"
[60] N. Kaur and S. K. Sood, "An Energy-Efficient Architecture for in IEEE Region 10 Symposium (TENSYMP), Cochin, India, 2017.
the Internet of Things (IoT)," IEEE Systems Journal, vol. 11, no. [79] A. M. George, V. I. George and M. A. George, "IoT based Smart
2, pp. 796-805, June 2017. Traffic Light Control System," in IEEE International Conference
[61] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang and W. Zhao, "A on Control, Power, Communication and Computing
Survey on Internet of Things: Architecture, Enabling Technologies, Kannur, India, 2018.
Technologies, Security and Privacy, and Applications," IEEE [80] A. Lah, L. A. Latiff, R. A. Dziyauddin, H. M. Kaidi and N.
Internet of Things Journal, vol. 4, no. 5, pp. 1125-1142, Oct. Ahmad, "Smart traffic monitoring and control architecture and
2017. design," in 2017 IEEE 15th Student Conference on Research and
[62] L. Atzori, A. Iera, G. Morabito and M. Nitti, "The Social Internet Development (SCOReD), Putrajay, 2017.
of Things (SIoT) – When social networks meet the Internet of [81] O. Avatefipour and F. Sadry, "Traffic Management System Using
Things: Concept, architecture and network characterization," IoT Technology - A Comparative Review," in IEEE International
Computer Network, vol. 56, no. 16, pp. 3594-3608, 2012. Conference on Electro/Information Technology, Rochester, MI,
[63] M. Leo, F. Battisti, . M. Carli and A. Neri, "A federated USA, 2018.
architecture approach for Internet of Things security," in IEEE [82] G. P. Reddy and N. S.R., "Image Based Obstacle Detection and
Euro Med Telco Conference (EMTC), Naples, Italy, 2014. Path Planning for Solar Powered Autonomous Vehicle," in
[64] S. Popli, R. K. Jha and S. Jain, "A Survey on Energy Efficient International Conference on Robotics and Automation for
Narrowband Internet of things (NBIoT): Architecture, Humanitarian Applications, Kollam, India, 2016.
Application and Challenges," IEEE Access (Early access), 2018. [83] A. Celesti, A. Galletta, L. Carnevale, M. Fazio and A. Lay-
[65] Y. Li, K. Chi, H. Chen, Z. Wang, and Y. Zhu, "Narrowband Ekuakille, "An IoT Cloud System for Traffic Monitoring and
Internet of Things Systems With Opportunistic D2D Vehicular Accidents Prevention Based on Mobile Sensor Data
Communication," IEEE Internet of Things Journal, vol. 5, no. 3, Processing," IEEE Sensors Journal, vol. 18, no. 12, pp. 4795-
pp. 1474-1484, June 2018. 4802, June 2018.
[66] R. Duan, X. Chen and T. Xing, "A QoS Architecture for IOT," in [84] C. Chellaswamy, H. Famitha, T. Anusuya and S. B.
IEEE International Conferences on Internet of Things, and Cyber, Amirthavarshini, "IoT Based Humps and Pothole Detection on
Physical and Social Computing, Dalian, China, 2011. Roads and Information Sharing," in 2018 International
Conference on Computation of Power, Energy, Information and
[67] Z. Shelby, C. Bormann, K. Hartke and B. Frank, "Constrained Communication (ICCPEIC), Chennai, 2018.
Application Protocol (CoAP)," IETF CoRE Working Group,
2011. [85] J. Y. Baek, S. H. Kim and M. C. Lee, "Path Planning of Unmanned
Vehicle using Potential Field and Lane Detection," in SICE
[68] Y. KAERI, C. MOULIN, K. SUGAWARA and Y. MANABE, Annual Conference, Taipei, Taiwan, 2010.
"Agent-based System Architecture Supporting Remote
Collaboration via an Internet of Multimedia Things Approach," [86] W. Xiong, C. Shan, Z. Sun and Q. Meng, "Real-time Processing
IEEE Access, vol. 6, pp. 17067 - 17079, 2018. and Storage of Multimedia Data with Content Delivery Network
in Vehicle Monitoring System," in International Conference on
[69] A. REGO, A. CANOVAS, J. M. JIMENEZ and J. LLORET, "An Wireless Networks and Mobile Communications, Marrakesh,
Intelligent System for Video Surveillance in IoT Environments," Morocco, Morocco, 2018.
IEEE Access, vol. 6, pp. 31580-31598, 2018.
[87] F. Ni, J. Wei and J. Shen, "An Internet of Things (IoTs) based
[70] M. A. Rahman, . M. S. Hossain, . E. Hassanain and . G. Intelligent Life Monitoring System for Vehicles," in 2018 IEEE
Muhammad, "Semantic Multimedia Fog Computing and IoT 3rd Advanced Information Technology, Electronic and
Environment: Sustainability Perspective," IEEE Communications Automation Control Conference (IAEAC), Chongqing, 2018.
Magazine, vol. 56, no. 5, pp. 80-87, 2018.
[88] T. Petrov, M. Dado, K. E. Ambrosch and P. Holecko,
[71] K. P. Seng and L. M. Ang, "A Big Data Layered Architecture and "Experimental Topology for V2V Communication Based on
Functional Units for the Multimedia Internet of Things," IEEE Internet of Things," in IEEE ELEKTRO, Strbske Pleso, Slovakia,
Transaction on Multi-Scale Computing Systems, pp. 1-12, 2018. 2016.
[72] N. Kushalnagar, G. Montenegro and C. Schumacher, "IPv6 over [89] T. T. Dandala, V. Krishnamurth and R. a. Alwan, "Internet of
Low-Power Wireless Personal Area Networks (6LoWPANs): Vehicles (10 V) for Traffic Management," in IEEE International
Overview, assumptions, problem statement, and goals," Internet Conference on Computer, Communication and Signal Processing,
Engineering Task Force (IETF), vol. 10, Aug. 2007. Chennai, India, 2017.
[73] L. Zhou and H. C. Chao, "Multimedia traffic security architecture [90] E. Türk and M. Challenger, "An Android-based IoT System for
for the internet of things," IEEE Network, vol. 25, no. 3, pp. 35 - Vehicle Monitoring and Diagnostic," in IEEE Signal Processing
40, May 2011. and Communications Applications Conference, Izmir, Turkey,
[74] D. Kundur, W. Luh, U. N. Okorafor and T. Zourntos, "Security 2018.
and Privacy for Distributed Multimedia Sensor Networks," [91] M. Saifuzzaman, N. N. Moon and F. N. Nur, "IoT Based Street
Proceedings of the IEEE, vol. 96, no. 1, pp. 112 - 130, Jan. 2008. Lighting And Traffic Management System," in IEEE Region 10
[75] H. Susanto and F. b. Muhaya, "Multimedia Information Security Humanitarian Technology Conference, Dhaka, Bangladesh,
Architecture Framework," in 2010 5th International Conference 2017.
on Future Information Technology, Busan, South Korea, 2010. [92] S. Latif, H. Afzaal and N. A. Zafar, "Intelligent Traffic
[76] L. Zhou, N. Xiong, L. Shu, A. Vasilakos and S. S. Yeo, "Context- Monitoring and Guidance System for Smart City," in
Aware Middleware for Multimedia Services in Heterogeneous International Conference on Computing, Mathematics and
Engineering Technologies, Sukkur, Pakistan, 2018.

44

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[93] L. Foschini, T. Taleb, A. Corradi and D. Bottazzi, "M2M-Based [109] Z. Zhang, F. Xia, M. Li and J. Ma, "An improved iris localization
Metropolitan Platform for IMS-Enabled Road Traffic method for authentication system," in IEEE International
Management in IoT," IEEE Communications Magazine, vol. 49, Conferences on Internet of Things, and Cyber, Physical and
no. 11, pp. 50-57, 2011. Social Computing, Dalian, China, 2011.
[94] N. Rajput, M. A. Mishra, A. Sisodia and I. Makarov, "A Novel [110] A. H. Basri, S. N. Ibrahim, N. A. Malik and A. L. Asnawi,
Autonomous Taxi Model for Smart Cities," in IEEE 4th World "Integrated Surveillance System with Mobile Application," in
Forum on Internet of Things, Singapore, Singapore, 2018. IEEE International Conference on Computer and Communication
[95] J. Y. Byun and A. Nasridinov, "Internet of Things for Smart Crime Engineering, Kuala Lumpur, Malaysia, 2018.
Detection," Contemporary Engineering Sciences, vol. 7, no. 15, [111] B. Fan, G. Pan, M. Liu and C. Li, "Design of a Home Surveillance
pp. 749-754, 2014. System Based on the Android Platform," in IEEE International
[96] J. Jin, J. Gubbi, T. Luo and M. Palaniswami, "Network Conference on Fuzzy Systems and Knowledge Discovery,
Architecture and QoS Issues in the Internet of Things for a Smart Shenzhen, China, 2015.
City," in International Symposium on Communications and [112] B. Q. Zadeh, J. Shen, I. O’Neill, P. Miller and P. Hanna, "A
Information Technologies, 2012. Speech Based Approach to Surveillance Video Retrieval," in
[97] D. Pasali, B. Cviji, D. Bundalo, Z. Bundalo and R. Stojanovi, IEEE International Conference on Advanced Video and Signal
"Vehicle Toll Payment System Based on Internet of Things Based Surveillance, Genova, Italy, 2009.
Concept," in IEEE 5th Mediterranean Conference on Embedded [113] X. Liu, T. Ogunfunmi, K. Takeuchi and S. Mathapathi, "Video-
Computing, Bar, Montenegro, 2016. Based IoT Baby Monitor for SIDS Prevention," in IEEE Global
[98] R. Patel, V. K. Dabhi and H. . B. Prajapati, "A Survey on IoT Humanitarian Technology Conference, San Jose, CA, USA, 2017.
based Road Traffic Surveillance and Accident Detection System," [114] S. S. Thomas, S. Gupta and V. K. Subramanian, "Smart
in IEEE International Conference on Innovations in Power and Surveillance Based on Video Summarization," in IEEE Region 10
Advanced Computing Technologies, Vellore, India, 2017. Symposium (TENSYMP), Cochin, India, 2017.
[99] F. Al-alem, M. A. Alsmirat and M. Al-Ayyoub, "On the road to [115] S. T. Lin, Y. H. Liao, Y. Tsao and S. Y. Chien, "Object-Based On-
the Internet of Biometric Things: A survey of fingerprint Line Video Summarization for Internet of Video Things," in IEEE
acquisition technologies and fingerprint databases," in 2016 International Symposium on Circuits and Systems (ISCAS),
IEEE/ACS 13th International Conference of Computer Systems Baltimore, MD, USA, 2017.
and Applications (AICCSA), Agadir, Morocco, 2016. [116] S. H. Ou, C. H. Lee, V. S. Somayazulu and . Y. K. Chen, "On-
[100] A. K. Das, M. Wazid, N. Kumar, A. V. Vasilakos and J. J. P. C. Line Multi-View Video Summarization for Wireless Video
Rodrigues, "Biometrics-Based Privacy-Preserving User Sensor Network," IEEE Journal of Selected Topics in Signal
Authentication Scheme for Cloud-Based Industrial Internet of Processing, vol. 9, no. 1, pp. 165-179, 2015.
Things Deployment," IEEE Internet of Things Journal, vol. 5, no. [117] S. H. Ou, C. H. Lee, V. S. Somayazulu, Y. K. Chen and S. Y.
6, pp. 4900-4913, Dec. 2018. Chien, "Video Sensor Node with Dis1t ributed Video Summary
[101] T. Maitra and D. Giri, "An Efficient Biometric and Password- for Internet-of-Things Applications," in International Conference
Based Remote User Authentication using Smart Card for Telecare on Consumer Electronics-Taiwan (ICCE-TW), Taipei, Taiwan,
Medical Information Systems in Multi-Server Environment," 2015.
Springer Journal of Medical System, vol. 38, no. 12, pp. 141-159, [118] M. I. Al-Saleh, M. A. Alsmirat, Y. Jararweh and I. Obaidat, "A
2014. Unified Key Distribution and Session Management Protocol for
[102] H. Hamidi, "An approach to develop the smart health using Mobile Video Surveillance Systems," in IEEE International
Internet of Things and authentication based on biometric Conference on Internet of Things: Systems, Management and
technology," Future Generation Computer Systems, vol. 91, pp. Security (IoTSMS), Valencia, Spain, 2018.
434-449, 2019. [119] W. Tsai, N. Huang and T. Tsai, "An automatic TBS index
[103] A. Boles and P. Rad, "Voice biometrics: Deep learning-based selection scheme for video transmission over narrow band cellular
voiceprint authentication system," in 2017 12th System of Systems IOT," in 2016 International Conference on Machine Learning
Engineering Conference (SoSE), Waikoloa, HI, 2017. and Cybernetics (ICMLC), Jeju, 2016.
[104] Y. Meng, W. Zhang, H. Zhu and X. S. Shen, "Securing Consumer [120] L. W. Chen, C. R. Chen and D. E. Chen, "VIPS: A Video-Based
IoT in the Smart Home: Architecture, Challenges, and Indoor Positioning System with Centimeter-Grade Accuracy for
Countermeasures," IEEE Wireless Communications, vol. 26, no. the IoT," in IEEE International Conference on Pervasive
6, pp. 53 - 59, 2018. Computing and Communications Demonstrations, Kona, HI,
[105] K. Pjatkin, M. Daneshmand, P. Rasti and G. Anbarjafari, USA, 2017.
"Probability Distribution Function based Iris Recognition Boosted [121] N. Cen, Z. Guan and T. Melodia, "Interview Motion Compensated
by The Mean Rule," in IEEE International Conference on Joint Decoding for Compressively Sampled Multiview Video
Intelligent Computing and Internet of Things, Harbin, China, Streams," IEEE Transactions on Multimedia, vol. 19, no. 6, pp.
2015. 1117-1126, June 2017.
[106] R. M. Parizi, A. Dehghantanha and K. R. Choo, "Towards Better [122] T. Zhang, A. Chowdhery, P. Bahl, K. Jamieson and S. Banerjee,
Ocular Recognition for Secure Real-World Applications," in 2018 "The Design and Implementation of a Wireless Video
17th IEEE International Conference On Trust, Security And Surveillance System," in International Conference on Mobile
Privacy In Computing And Communications/ 12th IEEE Computing and Networking, New York, USA, 2015.
International Conference On Big Data Science And Engineering [123] W. C. Ting, K. H. Lu, C. W. Lo, S. H. Chang and P. C. Liu, "Smart
(TrustCom/BigDataSE), New York, NY, USA, 2018. Video Hosting and Processing Platform for Internet-of-Things,"
[107] Y. Cheng, L. Jiao, Z. Li and X. Cao, "An improved retinal in IEEE International Conference on Internet of Things, Green
modeling for illumination face recognition," in 2014 IEEE Computing and Communications (GreenCom, Taipei, Taiwan,
International Conference on Image Processing (ICIP), Paris, 2014.
2014. [124] H. Silva and A. Neto, "A Holistic SDN-capable Session-Plane
[108] Z. Waheed, M. U. Akram, A. Waheed and A. Shaukat, "Robust Tailored for Efficient M-IoT Smart Surveillance Applications," in
Extraction of Blood Vessels for Retinal Recognition," in Second IEEE Globecom Workshops (GC Wkshps), Washington, DC,
International Conference on Information Security and Cyber USA, 2016.
Forensics, Cape Town, South Africa, 2015.

45

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[125] S. Baidya and M. Levorato, "Edge-assisted Content and [141] G. Witjaksono, A. A. Saeed Rabih, N. bt Yahya and S. Alva, "IOT
Computation-Driven Dynamic Network Selection for Real-Time for Agriculture: Food Quality and Safety," in IOP Conference
Services in the Urban IoT," in IEEE Conference on Computer Series: Materials Science and Engineering, 2018.
Communications Workshops (INFOCOM WKSHPS), Atlanta, [142] S. Boll, J. Meyer and N. E. O’Connor, "Health Media: From
GA, USA, 2017. Multimedia Signals to Personal Health Insights," IEEE
[126] E. Kougianos, S. P. Mohanty, G. Coelho, U. Albalawi and P. MultiMedia, vol. 25, no. 1, pp. 51-60, 2018.
Sundaravadivel, "Design of a High-Performance System for [143] A. R. Zafra, K. Benghazi, C. Mavromoustakis and M. Noguera,
Secure Image Communication in the Internet of Things," IEEE "An IoT-aware architectural model for smart habitats," in IEEE
Access, vol. 4, pp. 1222-1242, 2016. 16th International Conference on Embedded and Ubiquitous
[127] C. Y. Hsu, L. W. Kang, H. Y. Li, R. H. Fu, C. Y. Lin, M. F. Weng Computing (EUC), Bucharest, Romania, 2018.
and D. Y. Chen, "Depth-based Feature Extraction-Guided [144] T. Shah, A. Yavari, K. Mitra, S. Saguna, P. P. Jayaraman, F. Rabhi
Automatic Identification Tracking of Steel Products for Smart and R. Ranjan, "Remote health care cyber-physical system:
Manufacturing in Steel 4.0," in IEEE International Conference on quality of service (QoS) challenges and opportunities," IET
Applied System Innovation, Chiba, Japan, 2018. Cyber-Physical Systems: Theory & Applications, vol. 1, no. 1, pp.
[128] C. Y. Hsu, H. Y. Lin, L. W. Kang, M. F. Weng, C. M. Chang and 40-48, 2016.
T. Y. You, "3D Modeling for Steel Billet Images," in IEEE [145] I. U. Rehman, M. M. Nasralla, A. Ali and N. Philip, "Small Cell-
International Conference on Consumer Electronics, Taiwan, based Ambulance Scenario for Medical Video Streaming: A 5G-
2017. health use case," in IEEE International Conference on Smart
[129] R. N. Gore, H. Kour and M. Gandhi, "IoT based equipment Cities: Improving Quality of Life Using ICT & IoT, Islamabad,
identification and location for maintenance in large deployment Pakistan, 2018.
industrial plants," in 2018 10th International Conference on [146] H. SAMANI and R. ZHU, "Robotic Automated External
Communication Systems & Networks (COMSNETS), Bengaluru, Defibrillator Ambulance for Emergency Medical Service in Smart
India, 2018. Cities," IEEE Access, vol. 4, pp. 268-283, 2016.
[130] K. Sujatha, N. P. Bhavani, T. K. Reddy and K. R. Kumar, [147] Y. Ma, G. Dagnino, I. Georgilas and S. Dogramadzi, "Automatic
"Internet of Things for Flame Monitoring Power Station Boilers," Tool Detection in X-Ray Images for Robotic Assisted Joint
in IEEE Trends in Industrial Measurement and Automation Fracture Surgery," in 2017 IEEE International Conference on
(TIMA), Chennai, India, 2017. Internet of Things (iThings) and IEEE Green Computing and
[131] P. H. Kulkarni, P. D. Kute and V. N. More, "IoT Based Data Communications (GreenCom) and IEEE Cyber, Physical and
Processing for Automated Industrial Meter Reader using Social Computing (CPSCom) and IEEE Smart Data (SmartData),
Raspberry Pi," in IEEE International Conference on Internet of Exeter, 2017.
Things and Applications (IOTA), Pune, India, 2016. [148] M. K. Ishak and N. M. Kit, "Design and Implementation of Robot
[132] R. Yao, W. Wang and M. F. Baroughi, "Quality-Driven Energy- Assisted Surgery based on Internet of Things (IoT)," in IEEE
Neutralized Power and Relay Selection for Smart Grid Wireless International Conference on Advanced Computing and
Multimedia Sensor Based IoTs," IEEE Sensors Journal, vol. 13, Applications, Ho Chi Minh City, Vietnam, 2017.
no. 10, pp. 3637-3644, Oct. 2013. [149] I. R. de la Borbolla, M. Chicoskie and T. Tinnell, "Applying the
[133] K. Sornalatha and V. R. Kavitha, "IoT Based Smart Museum Internet of Things (IoT) to biomedical development for surgical
using Bluetooth Low Energy," in IEEE International Conference research and healthcare professional training," in 2017 IEEE
on Advances in Electrical, Electronics, Information, Technology & Engineering Management Conference
Communication and Bio-Informatics, Chennai, India, 2017. (TEMSCON), Santa Clara, CA, USA, 2017.
[134] A. S. Rao, A. V. Sharma and C. S. Narayan, "A Context Aware [150] M. kaur, J. kaur and R. kaur, "Low cost cataract detection system
System for an IoT-Based Smart Museum," in IEEE International using smart phone," in IEEE International Conference on Green
Multidisciplinary Conference on Computer and Energy Science, Computing and Internet of Things (ICGCIoT), Noida, India, 2015.
Split, Croatia, 2017. [151] F. Yin, B. H. Lee, A. P. Yow, Y. Quan and D. W. K. Wong,
[135] I. G. Plaksina, G. I. Chistokhina and D. V. Topolskiy, "Automatic Ocular Disease Screening and Monitoring Using a
"Development of a Transport Robot for Automated Warehouses," Hybrid Cloud System," in IEEE International Conference on
in IEEE International Multi-Conference on Industrial Internet of Things (iThings) and IEEE Green Computing and
Engineering and Modern Technologies, Vladivostok, Russia, Communications (GreenCom) and IEEE Cyber, Physical and
2018. Social Computing (CPSCom) and IEEE Smart Data (SmartData),
[136] G. Nisha and J. Megala, "Wireless sensor Network based Chengdu, China, 2016.
automated irrigation and crop field monitoring system," in 2014 [152] M. Amjad, M. H. Rehmani and S. Mao, "Wireless Multimedia
Sixth International Conference on Advanced Computing (ICoAC), Cognitive Radio Networks: A Comprehensive Survey," IEEE
Chennai, 2014. Communications Surveys & Tutorials, vol. 20, no. 2, pp. 1056-
[137] M. Lee, J. Hwang and H. Yoe, "Agricultural Production System 1103, Secondquarter 2018.
based on IoT," in 2013, Sydney, NSW, Australia, IEEE 16th [153] K. Brunnström, S. A. Beker, K. D. Moor, A. Dooms, S. Egger,
International Conference on Computational Science and M.-. N. Garcia, T. Hossfeld, S. J. Pyykko, C. Keimel and M.
Engineering. Chaker Larabi, "Qualinet White Paper on Definitions of Quality
[138] J. Lee, H. Kang and H. Bang, "Dynamic Crop Field Analysis of Experience," HAL, 2014.
using Mobile Sensor Node," in IEEE International Conference on [154] ITU-T, "Series P: Telephone Transmission Quality, Telephone
ICT Convergence, Jeju Island, South Korea, 2012. Installations, Local Line Networks Recommendation ITU-T
[139] D. K. Sreekantha and A. M. Kavya, "Agricultural Crop p.10/g.100," International Telecommunication Union,
Monitoring using IOT- A Study," in IEEE International Switzerland, Geneva, 2008.
Conference on Intelligent Systems and Control, Coimbatore, [155] X. Huang, K. Xie, S. Leng, T. Yuan and M. Ma, "Improving
India, 2017. Quality of Experience in multimedia Internet of Things leveraging
[140] K. Yanai, T. Maruyama and Y. Kawano, "A Cooking Recipe machine learning on big data," Future Generation Computer
Recommendation System with Visual Recognition of Food Systems, vol. 86, pp. 1413-1423, 2018.
Ingredients," International Journal of Interactive Mobile
Technologies, vol. 8, no. 2, pp. 28-34, 2014.

46

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[156] A. Floris and L. Atzori, "Managing the Quality of Experience in [173] W. Su and K. Feng, "QoS-Guaranteed Power-Saving
the Multimedia Internet of Things: A Layered-Based Approach," Configuration Prediction Scheme for 5G IoT," in GLOBECOM
Sensors, vol. 16, no. 2057, 2016. 2017 - 2017 IEEE Global Communications Conference,
[157] A. Floris and L. Atzori, "Quality of Experience in the Multimedia Singapore, 2017.
Internet of Things: definition and practical use cases," in IEEE [174] R. R. Chodorek, G. Rzym, K. Wajda and A. Chodorek, "A
International Conference on Communication Workshop (ICCW), comparison of QoS parameters of WebRTC videoconference with
London, UK, 2015. conference bridge placed in private and public cloud," in IEEE
[158] A. Karaadi, I. Mkwawa and L. Sun, "How to Manage Multimedia 26th International Conference on Enabling Technologies:
Traffic: Based on QoE or QoT?," ZTE COMMUNICATIONS, vol. Infrastructure for Collaborative Enterprises, Poznan, Poland,
16, no. 3, pp. 23-29, 2018. 2017.
[159] Y. Ikeda, S. Kouno, A. Shiozu and K. Noritake, "A Framework of [175] H. Elhammouti, E. Sabir, M. Benjillali, L. Echabbi and H.
Scalable QoE Modeling for Application Explosion in the Internet Tembine, "Self-Organized Connected Objects: Rethinking QoS
of Things," in IEEE 3rd World Forum on Internet of Things (WF- Provisioning for IoT Services," IEEE Communications Magazine,
IoT), Reston, VA, USA, 2016. vol. 55, no. 9, pp. 41- 47, 2017.
[160] E. Grigoriou, A. A. Barakabitze, L. Atzori, L. Sun and V. Pilloni, [176] M. Marjani et al., "Big IoT Data Analytics: Architecture,
"An SDN-approach for QoE management of multimedia services Opportunities, and Open Research Challenges," IEEE Access, vol.
using resource allocation," in IEEE ICC Communications 5, pp. 5247-5261, 2017.
Software, Services, and Multimedia Applications Symposium, [177] W. Zhu , P. Cui, . Z. Wang and G. Hua , "Multimedia Big Data
Paris, France, 2017. Computing," IEEE MultiMedia, vol. 22, no. 3, pp. 96-105, 2015.
[161] S. He and W. Wang, "Multimedia Upstreaming Cournot Game in [178] B. Sadiq, F. U. Rehman, A. Ahmad, M. . A. Rahman, S. Ghani,
Non-Orthogonal Multiple Access Internet of Things," IEEE A. Murad, S. Basalamah and A. Lbath, "A spatio-temporal
Transactions on Network Science and Engineering (Early multimedia big data framework for a large crowd," in 2015 IEEE
Access), 2019. International Conference on Big Data (Big Data), Santa Clara,
[162] M. Elkotob, D. Grandlund, K. Andersson and C. Ahlund, CA, USA, 2015.
"Multimedia QoE Optimized Management Using Prediction and [179] J. R. Ohm and G. J. Sullivan, "High efficiency video coding: the
Statistical Learning," in IEEE Local Computer Network next frontier in video compression [Standards in a Nutshell],"
Conference, Denver, CO, USA, 2010. IEEE Signal Processing Magazine, vol. 30, no. 1, pp. 152 - 158,
[163] A. Ahmad, A. Floris and L. Atzori, "Towards QoE Monitoring at Jan. 2013.
User Terminal: A Monitoring Approach based on Quality [180] M. P. Sharabayko, O. G. Ponomarev and R. I. Chernyak, "Intra
Degradation," in IEEE International Symposium on Broadband compression efficiency in VP9 and HEVC," Applied
Multimedia Systems and Broadcasting (BMSB), Cagliari, Italy, Mathematical Sciences, vol. 7, no. 137, pp. 6803 - 6824, 2013.
2017. [181] D. Grois, D. Marpe, A. Mulayoff, B. Itzhaky and O. Hadar,
[164] W. Wang and Q. Wang, "Price the QoE, Not the Data: SMP- "Performance comparison of H.265/MPEG-HEVC, VP9, and
Economic Resource Allocation in Wireless Multimedia Internet H.264/MPEG-AVC encoders," in 2013 Picture Coding
of Things," IEEE Communications Magazine, vol. 56, no. 9, pp. Symposium (PCS), San Jose, CA, USA, 2013.
74 - 79, 2018. [182] X. Liu, Y. Li, C. Dai, P. Li and L. T. Yang, "An Efficient
[165] ITU-T, "Definitions of terms related to quality of service H.264/AVC to HEVC Transcoder for Real-Time Video
Recommendation ITU-T E.800," International Communication in Internet of Vehicles," IEEE Internet of Things
Telecommunication Union, 2009. Journal, vol. 5, no. 4, pp. 3186-3197, Aug. 2018.
[166] Microsoft, "Quality of Service Technical White Paper," [183] J. Santos, D. Peng, M. Hempel and H. Sharif, "Fidelity-preserving
Microsoft. coefficient truncation method for wavelet-based compressors for
[167] J. Yang, B. Jiang, H. Song, X. Yang, W. Lu and H. Liu, "No- biomedical IoT applications," in 2017 11th International
Reference Stereoimage Quality Assessment for Multimedia Conference on Signal Processing and Communication Systems
Analysis Towards Internet-of-Things," IEEE Access, vol. 6, pp. (ICSPCS), Gold Coast, QLD, Australia, 2017.
7631-7640, 2018. [184] X. Liu, C. Sun, K. Kang and L. Zhang, "Joint 3-D Image Quality
[168] P. Bellavista, C. Giannelli, T. Lagkas and P. Sarigiannidis, Assessment Metric by Using Image View and Depth Information
"Quality Management of Surveillance Multimedia Streams Via Over the Networking in IoT," IEEE Systems Journal, vol. 10, no.
Federated SDN Controllers in Fiwi-Iot Integrated Deployment 3, pp. 1203 - 1213, Sept. 2016.
Environments," IEEE Access, vol. 6, pp. 21324-21341, 2018. [185] W. Hu, W. Zhang, H. Hu, Y. Wen and K. J. Tseng, "Toward Joint
[169] A. A. Simiscuka, M. Bezbradica and G. M. Muntean, Compression–Transmission Optimization for Green Wearable
"Performance Analysis of the Quality of Service-aware Devices: An Energy-Delay Tradeoff," IEEE Internet of Things
Networking Scheme for Smart Internet of Things Gateways," in Journal, vol. 4, no. 4, pp. 1006-1018, Aug. 2017.
2017 13th International Wireless Communications and Mobile [186] T. Wei, J. Zhou, K. Cao, P. Cong, M. Chen, G. Zhang, X. S. Hu
Computing Conference, Valencia, Spain, 2017. and J. Yan, "Cost-Constrained QoS Optimization for
[170] M. Aazam, M. St-Hilaire, C. H. Lung and I. Lambadaris, Approximate Computation Real-Time Tasks in Heterogeneous
"MeFoRE: QoE based Resource Estimation at Fog to Enhance MPSoCs," IEEE Transactions on Computer-Aided Design of
QoS in IoT," in 2016 23rd International Conference on Integrated Circuits and Systems, vol. 37, no. 9, pp. 1733-1746,
Telecommunications (ICT), Thessaloniki, Greece, 2016. Sept. 2018.
[171] N. Blum, J. Fiedler, L. Lange and T. Magedanz, "Application- [187] N. Khernane, J. F. Couchot and A. Mostefaoui, "Optimal
driven Quality of Service for M2M Communications," in 15th power/rate trade-off for internet of multimedia things lifetime
International Conference on Intelligence in Next Generation maximization under dynamic links capacity," Future Generation
Network, Berlin, Germany, 2011. Computer Systems, vol. 93, pp. 737-750, 2019.
[172] Z. Ning, Y. Liu, X. Wang, Y. Feng and X. Kong, "A Novel QoS- [188] Y. K. Chen and S. Y. Chien, "Perpetual video camera for Internet-
based QoE Evaluation Method for Streaming Video Service," in of-things," in 2012 Visual Communications and Image
IEEE International Conference on Internet of Things (iThings) Processing, San Diego, CA., 2012.
and IEEE Green Computing and Communications (GreenCom), [189] S. Aljawarneh, M. B. Yassein and W. A. Talafha, "A resource-
Exeter, UK, 2017. efficient encryption algorithm for multimedia big data,"

47

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

Multimedia Tools and Applications, vol. 76, no. 21, p. 22703– Cloud-Edge IoT and Fogs," IEEE Internet of Things Journal, vol.
22724, 2017. 4, no. 2, pp. 487-495, April 2017.
[190] A. Aslam and E. Curry, "Towards a Generalized Approach for [207] I. Stojmenovic and S. Wen, "The Fog Computing Paradigm:
Deep Neural Network Based Event Processing for the Internet of Scenarios and Security Issues," in 2014 Federated Conference on
Multimedia Things," IEEE Access, vol. 6, pp. 25573-25587, 2018. Computer Science and Information Systems, Warsaw, Poland,
[191] C. Angsuchotmetee, R. Chbeir and Y. Cardinale, "MSSN-Onto: 2014.
An ontology-based approach for flexible event processing in [208] "Fog Computing and the Internet of Things: Extend the Cloud to
Multimedia Sensor Networks," Future Generation Computer Where the Things Are," Cisco, 2015.
Systems, 2018. [209] F. Bonomi, R. Milito, J. Zhu and S. Addepalli, "Fog Computing
[192] N. Xu, A.-A. Liu, W.-Z. Nie and Y.-T. Su, "Attention-in- and Its Role in the Internet of Things," in Proceedings of the first
Attention Networks for Surveillance Video Understanding in edition of the MCC workshop on Mobile cloud computing, New
Internet of Things," IEEE Internet of Things Journal, vol. 5, no. York, USA, 2012.
5, pp. 3419-3429, Oct. 2018. [210] I. Stojmenovic, S. Wen, X. Huang and H. Luan, "An overview of
[193] A. Saha, Y. W. Lee, Y. S. Hwang, K. E. Psannis and B. G. Kim, Fog computing and its security issues," Concurrency and
"Context-aware block-based motion estimation algorithm for Computation: Practice and Experience, vol. 28, no. 10, pp. 2991-
multimedia internet of things (IoT) platform," Personal and 3005, 2016.
Ubiquitous Computing, vol. 22, no. 1, p. 163–172, 2018. [211] W. Shi, J. Cao, Q. Zhang, Y. Li and L. Xu, "Edge Computing:
[194] K. Thiyagarajan, R. Lu, K. El-Sankary and H. Zhu, "Energy- Vision and Challenges," IEEE Internet of Things Journal, vol. 3,
Aware Encryption for Securing Video Transmission in Internet of no. 5, pp. 637- 646, Oct. 2016.
Multimedia Things," IEEE Transactions on Circuits and Systems [212] D. Linthicum, "Cisco," Cisco, [Online]. Available:
for Video Technology, vol. 29, no. 3, pp. 610 - 624, March 2019. https://www.cisco.com/c/en/us/solutions/enterprise-
[195] I. Foster, Y. Zhao, I. Raicu and S. Lu, "Cloud Computing and Grid networks/edge-computing.html. [Accessed 26 04 2019].
Computing 360-Degree Compared," in 2008 Grid Computing [213] R. Deng, R. Lu, C. Lai, T. h. Luan and H. Liang, "Optimal
Environments Workshop, Austin, TX, USA, 2008. Workload Allocation in Fog-Cloud Computing Toward Balanced
[196] P. Mell and T. Grance, "The NIST Definition of Cloud Delay and Power Consumption," IEEE Internet of Things Journal,
Computing," National Institute of Standards and Technology, vol. 3, no. 6, pp. 1171 - 1181, Dec. 2016.
Information Technology Laboratory, vol. 15, 2009. [214] N. Chen, Y. Chen, Y. You, H. Ling, P. Liang and R.
[197] T. Dillon, C. Wu and E. Chang, "Cloud Computing: Issues and Zimmermann, "Dynamic Urban Surveillance Video Stream
Challenges Tharam," in 2010 24th IEEE International Conference Processing Using Fog Computing," in 2016 IEEE Second
on Advanced Information Networking and Applications, Perth, International Conference on Multimedia Big Data (BigMM),
WA, Australia, 2010. Taipei, Taiwan, April 2016.
[198] E. Cavalcante, J. Pereira, M. P. Alves, P. Maia, R. Moura, T. [215] A. Yousefpour, G. Ishigaki and J. P. Jue, "Fog Computing:
Batista, F. C. Delicato and P. F. Pires, "On the interplay of Internet Towards Minimizing Delay in the Internet of Things," in 2017
of Things and Cloud Computing: A systematic mapping study," IEEE International Conference on Edge Computing (EDGE),
Computer Communications, vol. 89, no. 90, pp. 17-33, 2016. Honolulu, HI, USA, 2017.
[199] F. Renna, J. Doyle, V. Giotsas and Y. Andreopoulos, "Media [216] L. Ni, J. Zhang, C. Jiang, C. Yan and K. Yu, "Resource Allocation
Query Processing for the Internet-of-Things: Coupling of Device Strategy in Fog Computing Based on Priced Timed Petri Nets,"
Energy Consumption and Cloud Infrastructure Billing," IEEE IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1216 - 1228,
Transactions on Multimedia, vol. 18, no. 12, pp. 2537-2552, Dec. Oct. 2017.
2016. [217] S. Yang, "IoT Stream Processing and Analytics in the Fog," IEEE
[200] A. M. M. Ali, N. M. Ahmad and A. H. M. Amin, "Cloudlet-based Communications Magazine, vol. 55, no. 8, pp. 21 - 27, August
Cyber Foraging Framework for Distributed Video Surveillance 2017.
Provisioning," in 2014 4th World Congress on Information and [218] J. Xu, K. Ota and M. Dong, "Real-Time Awareness Scheduling
Communication Technologies (WICT 2014), Bandar Hilir, for Multimedia Big Data Oriented In-Memory Computing," IEEE
Malaysia, 2015. Internet of Things Journal, vol. 5, no. 5, pp. 3464-3473, Oct.
[201] A. H. M. Amin, N. M. Ahmad and A. M. M. Ali, "Decentralized 2018.
Face Recognition Scheme for Distributed Video Surveillance in [219] B. Cheng, A. Papageorgiou, F. Cirillo and E. Kovacs, "GeeLytics:
IoT-Cloud Infrastructure," in 2016 IEEE Region 10 Symposium Geo-distributed Edge Analytics for Large Scale IoT Systems
(TENSYMP), Bali, Indonesia, 2016. Based on Dynamic Topology," in 2015 IEEE 2nd World Forum
[202] J. Wang, B. Amos, A. Das, P. Pillai, N. Sadeh and M. on Internet of Things (WF-IoT), Milan, Italy, Dec. 2015.
Satyanarayanan, "A Scalable and Privacy-Aware IoT Service for [220] S. Choochotkaew, H. Yamaguchi, T. Higashino, M. Shibuya and
Live Video Analytics," in Proceedings of the 8th ACM on T. Hasegawa, "EdgeCEP: Fully-distributed Complex Event
Multimedia Systems Conference, Taipei, Taiwan, 2017. Processing on IoT Edges," in 2017 13th International Conference
[203] H. Hong, C. Fan, Y. Lin and C. Hsu, "Optimizing Cloud-Based on Distributed Computing in Sensor Systems (DCOSS), Ottawa,
Video Crowdsensing," IEEE Internet of Things Journal, vol. 3, ON, Canada, June 2017.
no. 3, pp. 299-313, June 2016. [221] H. Li, K. Ota and M. Dong, "Learning IoT in Edge: Deep Learning
[204] A. Bajpai, B. Choudhury and S. Choudhury, "An adaptive and for the Internet of Things with Edge Computing," IEEE Network,
elastic cloud based framework for service oriented computing in vol. 32, no. 1, pp. 96 - 101, January 2018.
Internet of Things," in 2017 9th International Conference on [222] S. K. Sharma and X. Wang, "Live Data Analytics With
Communication Systems and Networks (COMSNETS), Bangalore, Collaborative Edge and Cloud Processing in Wireless IoT
India, 2017. Networks," IEEE Access, vol. 5, pp. 4621 - 4635, March 2017.
[205] L. Toka, B. Lajtha, E. Hosszu, B. Formanek, D. Gehberger and J. [223] C. Long, Y. Cao, T. Jiang and Q. Zhang, "Edge Computing
Tapolcai, "A Resource-Aware and Time-Critical IoT Framework for Cooperative Video Processing in Multimedia IoT
Framework," in IEEE INFOCOM 2017 - IEEE Conference on Systems," IEEE Transactions on Multimedia, vol. 20, no. 5, pp.
Computer Communications, Atlanta, GA, USA, 2017. 1126 - 1139, May 2018.
[206] W. Wang, Q. Wang and K. Sohraby, "Multimedia Sensing as a
Service (MSaaS): Exploring Resource Saving Potentials of at

48

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[224] A. R. Elias, N. Golubovic, C. Krintz and R. Wolski, "Where's the [241] T. Winter, P. Thubert, A. Brandt, J. Hui, R. Kelsey, P. Levis, K.
Bear? - Automating Wildlife Image Processing Using IoT and Pister, R. Struik, J. Vasseur and R. Alexander, "RPL: IPv6
Edge Cloud Systems," in 2017 IEEE/ACM Second International Routing Protocol for Low-Power and Lossy Networks," Internet
Conference on Internet-of-Things Design and Implementation Engineering Task Force (IETF) RFC 6550, March 2012.
(IoTDI), Pittsburgh, USA, 2017. [242] O. Gaddour and A. Koubaa, "RPL in a nutshell: A survey,"
[225] H. Kim and N. Feamster, "Improving network management with Computer Networks, vol. 56, no. 14, pp. 3163-3178, September
software defined networking," IEEE Communications Magazine, 2012.
vol. 51, no. 2, pp. 114-119, 2013. [243] H. S. Kim, J. Ko, . D. E. Culler and J. Paek, "Challenging the IPv6
[226] T. Wood, J. Hwang, G. Liu, W. Zhang and K. K. Ramakrishnan, Routing Protocol for Low-Power and Lossy Networks (RPL): A
"Toward a software-based network: Integrating software defined Survey," IEEE Communications Surveys & Tutorials, vol. 19, no.
networking and network function virtualization," IEEE Network, 4, pp. 2502 - 2525, Fourthquarter 2017.
vol. 29, no. 3, pp. 36-41, 2015. [244] I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F. V. d.
[227] H. Yoon, S. Kim, T. Nam and J. Kim, "Dynamic flow steering for Abeele, E. D. Poorter, I. Moerman and P. Demeester, "IETF
IoT monitoring data in SDN-coordinated IoT-Cloud services," in Standardization in the Field of the Internet of Things (IoT): A
2017 International Conference on Information Networking Survey," Journal of Sensor and Actuator Networks, vol. 2, pp.
(ICOIN), Da Nang, Vietnam, 2017. 235-287, April 2013.
[228] A. El-Mougy, M. Ibnkahla and L. Hegazy, "Software-defined [245] T. Salman and R. Jain, "Networking protocols and standards for
wireless network architectures for the Internet-of-Things," in internet of things," in Internet of Things and Data Analytics
2015 IEEE 40th Local Computer Networks Conference Handbook, John Wiley & Sons, Inc., February 2017.
Workshops (LCN Workshops), Clearwater Beach, FL, USA, 2015. [246] Y. B. Zikria, H. Yu, M. K. Afzal, M. H. Rehmani and O. Hahm,
[229] S. Bera, S. Misra, S. K. Roy and M. S. Obaidat, "Soft-WSN: "Internet of Things (IoT): Operating System, Applications and
Software-Defined WSN Management System for IoT Protocols Design, and Validation Techniques," Future
Applications," IEEE Systems Journal, vol. 12, no. 3, pp. 2074 - Generation Computer Systems, vol. 88, pp. 699-706, November
2081, Sept. 2018. 2018.
[230] R. Vilalta, R. Ciungu, A. Mayoral, R. Casellas, R. Martinez, D. [247] F. Al-Turjman, Multimedia-enabled Sensors in IoT: Data
Pubill, J. Serra, R. Munoz and C. Verikoukis, "Improving Security Delivery and Traffic Modelling, Boca Raton: CRC Press, April,
in Internet of Things with Software Defined Networking," in 2016 2018.
IEEE Global Communications Conference (GLOBECOM), [248] T. D. Nguyen, J. Y. Khan and D. T. Ngo, "A Distributed Energy-
Washington, DC, USA, Dec. 2016. Harvesting-Aware Routing Algorithm for Heterogeneous IoT
[231] S. Bera, S. Misra and A. V. Vasilakos, "Software-Defined Networks," IEEE Transactions on Green Communications and
Networking for Internet of Things: A Survey," IEEE Internet of Networking, vol. 2, no. 4, pp. 1115 - 1127, Dec. 2018.
Things Journal, vol. 4, no. 6, pp. 1994-2008, Dec. 2017. [249] H. Trinh, P. Calyam, D. Chemodanov, S. Yao, Q. Lei, F. Gao and
[232] A. Zahmatkesh and T. Kunz, "Software defined multihop wireless K. Palaniappan, "Energy-Aware Mobile Edge Computing and
networks: Promises and challenges," Journal of Communications Routing for Low-Latency Visual Data Processing," IEEE
and Networks, vol. 19, no. 6, pp. 546-554, Dec. 2017. Transactions on Multimedia, vol. 20, no. 10, pp. 2562-2577, Oct.
[233] D. F. Macedo, D. Guedes, L. F. M. Vieira, M. A. M. Vieira and 2018.
M. Nogueira, "Programmable Networks—From Software- [250] S. Taghizadeh, H. Bobarshad and H. Elbiaze, "CLRPL: Context-
Defined Radio to Software-Defined Networking," IEEE Aware and Load Balancing RPL for Iot Networks Under Heavy
Communications Surveys & Tutorials, vol. 17, no. 2, pp. 1102- and Highly Dynamic Load," IEEE Access, vol. 6, pp. 23277-
1125, Secondquarter 2015. 23291, April 2018.
[234] K. Kaur, S. Garg, G. S. Aujla, N. Kumar, J. Rodrigues and M. [251] J. Lin, P. R. Chelliah, M. Hsu and J. Hou, "Efficient Fault-
Guizani, "Edge Computing in the Industrial Internet of Things Tolerant Routing in IoT Wireless Sensor Networks Based on
Environment: Software-Defined-Networks-Based Edge-Cloud Bipartite-Flow Graph Modeling," IEEE Access, vol. 7, pp. 14022-
Interplay," IEEE Communications Magazine, vol. 56, no. 2, pp. 14034, Jan. 2019.
44-51, Feb. 2018. [252] T. Li, S. Tian, A. Liu, H. Liu and T. Pei, "DDSV: Optimizing
[235] O. Salman, I. Elhajj, A. Kayssi and A. Chehab, "Edge Computing Delay and Delivery Ratio for Multimedia Big Data Collection in
Enabling the Internet of Things," in 2015 IEEE 2nd World Forum Mobile Sensing Vehicles," IEEE Internet of Things Journal, vol.
on Internet of Things (WF-IoT), Milan, Italy, 2015. 5, no. 5, pp. 3474-3486, Oct. 2018.
[236] Y. Wang, Y. Zhang and J. Chen, "An SDN-based [253] S. Jeong, E. Park, D. Woo, H.-S. Kim, J. Paek and S. Bahk,
publish/subscribe-enabled communication platform for IoT "MAPLE: Mobility support using asymmetric transmit power in
services," China Communications, vol. 15, no. 1, pp. 95 - 106, low-power and lossy networks," Journal of Communications and
February 2018. Networks, vol. 20, no. 4, pp. 414 - 424, August 201.
[237] A. C. Baktir, A. Ozgovde and C. Ersoy, "How Can Edge [254] M. Amjad, M. K. Afzal, T. Umer and B. Kim, "QoS-Aware and
Computing Benefit From Software-Defined Networking: A Heterogeneously Clustered Routing Protocol for Wireless Sensor
Survey, Use Cases, and Future Directions," IEEE Networks," IEEE Access, vol. 5, pp. 10250-10262, June 2017.
Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2359 - [255] D. F. L. Filho and J. R. Amazonas, "TCNet: Trellis Coded
2391, June 2017. Network — Implementation of QoS-aware routing protocols in
[238] ITU, "Traffic routing Recommendation E.170," International WSNs," in 2012 IEEE Latin-America Conference on
Telecommunication Union, 2007. Communications, Cuenca, Nov. 2012.
[239] G. Montenegro, N. Kushalnagar, J. Hui and D. Culler, [256] A. Bahnasse, F. E. Louhab, H. . A. Oulahyane, M. Talea and A.
"Transmission of IPv6 Packets over IEEE 802.15.4 Networks," Bakali, "Novel SDN architecture for smart MPLS Traffic
Internet Proposed Standard RFC 4944, September 2007. Engineering-DiffServ Aware management," Future Generation
[240] N. Kushalnagar, G. Montenegro and C. Schumacher, "IPv6 over Computer Systems, vol. 87, pp. 115-126, October 2018.
Low-Power Wireless Personal Area Networks (6LoWPANs): [257] N. Saha, S. Bera and S. Misra, "Sway: Traffic-Aware QoS
Overview, Assumptions, Problem Statement, and Goals," IETF Routing in Software-Defined IoT," IEEE Transactions on
RFC 4919, 2007. Emerging Topics in Computing, June 2018.

49

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[258] C. Shih, C. H. Li and J. Chou, "Distributed QoS Aware Meta- Networks," in 2010 7th International Symposium on Wireless
Routing for IoT/CPS," in 2016 IEEE 4th International Communication Systems, York, 2010.
Conference on Cyber-Physical Systems, Networks, and [275] S. Farahani, "ZigBee and IEEE 802.15.4 Protocol Layers," in
Applications (CPSNA), Nagoya, 2016. ZigBee Wireless Networks and Transceivers, Dec. 2008, pp. 33-
[259] S. Rani, R. Talwar, J. Malhotra, S. H. Ahmed, M. Sarkar and H. 135.
Song, "A Novel Scheme for an Energy Efficient Internet of Things [276] E. Karapistoli, F.-N. Pavlidou, I. Gragopoulos and I. Tsetsinas,
Based on Wireless Sensor Networks," sensors, vol. 15, no. 11, pp. "An overview of the IEEE 802.15.4a Standard," IEEE
28603-28626, Nov 2015. Communications Magazine, vol. 48, no. 1, pp. 47-53, January
[260] I. Bennis, H. Fouchal, K. Piamrat and M. Ayaida, "Efficient 2010.
queuing scheme through cross-layer approach for multimedia [277] K. A. Ali and H. T. Mouftah, "Wireless personal area networks
transmission over WSNs," Computer Networks, vol. 134, pp. 272- architecture and protocols for multimedia applications," Ad Hoc
282, April 2018. Networks, vol. 9, no. 4, pp. 675-686, 2011.
[261] D. Rosario, Z. Zhao, A. Santos, T. Braun and E. Cerqueira, "A [278] R. Giuliano and F. Mazzenga, "Performance Evaluation of UWB
beaconless Opportunistic Routing based on a cross-layer approach Sensor Network with Aloha Multiple Access Scheme," in In
for efficient video dissemination in mobile multimedia IoT International Workshop on Wireless Ad-hoc Networks, IWWAN
applications," Computer Communications, vol. 45, pp. 21-31, 2005, London, UK, 2005.
June 2014.
[279] M. Al-Nuaimi, F. Sallabi and K. Shuaib, "A survey of Wireless
[262] M. Z. Hasan, F. Al-Turjman and H. Al-Rizzo, "Analysis of Cross- Multimedia Sensor Networks challenges and solutions," in 2011
Layer Design of Quality-of-Service Forward Geographic International Conference on Innovations in Information
Wireless Sensor Network Routing Strategies in Green Internet of Technology, Abu Dhabi, 2011.
Things," IEEE Access, vol. 6, pp. 20371-20389, April 2018.
[280] E. Toscano and L. L. Bello, "Multichannel Superframe
[263] F. Al-Turjman and . A. Radwan, "Data Delivery in Wireless Scheduling for IEEE 802.15.4 Industrial Wireless Sensor
Multimedia Sensor Networks: Challenging and Defying in the IoT Networks," IEEE Transactions on Industrial Informatics, vol. 8,
Era," IEEE Wireless Communications, vol. 24, no. 5, pp. 126 - no. 2, pp. 337-350, May 2012.
131, October 2017.
[281] F. Chen, N. Wang, R. German and F. Dressler, "Simulation study
[264] S. Aswale and V. R. Ghorpade, "EEMGR: Energy and ETX aware of IEEE 802.15.4 LR-WPAN for industrial applications,"
Multipath Geographic Routing in WMSN," in 2018 3rd Wireless Communications and Mobile Computing, vol. 10, pp.
International Conference On Internet of Things: Smart Innovation 609-621, 2010.
and Usages (IoT-SIU), Bhimtal, 2018.
[282] S. Yoo et al., "Guaranteeing Real-Time Services for Industrial
[265] S. Lin and K. Chen, "Statistical QoS Control of Network Coded Wireless Sensor Networks With IEEE 802.15.4," IEEE
Multipath Routing in Large Cognitive Machine-to-Machine Transactions on Industrial Electronics, vol. 57, no. 11, pp. 3868-
Networks," IEEE Internet of Things Journal, vol. 3, no. 4, pp. 3876, Nov. 2010.
619-627, Aug. 2016.
[283] K. T. Kim, H. Kim, H. Park and S.-T. Kim, "An industrial IoT
[266] M. Chen, J. Wang, K. Lin, D. Wu, J. Wan, L. Peng and C.-H. MAC protocol based on IEEE 802.15.4e TSCH for a large-scale
Youn, "M-Plan: Multipath Planning based Transmissions for IoT network," in 2017 19th International Conference on Advanced
Multimedia Sensing," in 2016 International Wireless Communication Technology (ICACT), Bongpyeong, 2017.
Communications and Mobile Computing Conference (IWCMC),
Paphos, 2016. [284] L. Filipe, F. F. Riverola, N. M. Silva Costa and A. M. Pereira,
"Wireless Body Area Networks for Healthcare Applications:
[267] G. Chen, J. Tang and J. P. Coon, "Optimal Routing for Multihop Protocol Stack Review," International Journal of Distributed
Social-Based D2D Communications in the Internet of Things," Sensor Networks, vol. 11, pp. 1-23, 2015.
IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1880-1889,
June 2018. [285] N. Fahmi, U. Al-Rasyid and A. Sudarsono, "Adaptive Sleep
Scheduling for Health Monitoring System Based on the IEEE
[268] A. A. Ahmed, "A real-time routing protocol with adaptive traffic 802.15.4 Standard," EMITTER International Journal of
shaping for multimedia streaming over next-generation of Engineering Technology, vol. 4, no. 1, pp. 91-114, June 2016.
Wireless Multimedia Sensor Networks," Pervasive and Mobile
Computing, vol. 40, pp. 495-511, September 2017. [286] M. Deylami and E. Jovanov, "Performance analysis of coexisting
IEEE 802.15.4-based health monitoring WBANs," in 2012
[269] F. Al-Turjman, "QoS—aware data delivery framework for safety- Annual International Conference of the IEEE Engineering in
inspired multimedia in integrated vehicular-IoT," Computer Medicine and Biology Society, San Diego, CA, 2012.
Communications, vol. 121, pp. 33-43, May 2018.
[287] S. Saleem, S. Ullah and K. K. Kwak, "A Study of IEEE 802.15.4
[270] S. Sinche, O. Polo, D. Raposo, M. Fernandes, F. Boavida, A. Security Framework for Wireless Body Area Networks," Sensors,
Rodrigues, V. Pereira and J. S. Silva, "Assessing Redundancy vol. 11, no. 2, pp. 1383-1395, 2011.
Models for IoT Reliability," in 2018 IEEE 19th International
Symposium on "A World of Wireless, Mobile and Multimedia [288] S. Paniga, L. Borsani, A. Redondi, M. Tagliasacchi and M.
Networks" (WoWMoM), Chania, 2018. Cesana, "Experimental evaluation of a video streaming system for
Wireless Multimedia Sensor Networks," in 2011 The 10th IFIP
[271] G. Araniti, M. Condoluci, P. Scopelliti, A. Molinaro and A. Iera, Annual Mediterranean Ad Hoc Networking Workshop, Favignana
"Multicasting over Emerging 5G Networks: Challenges and Island, Sicily, 2011.
Perspectives," IEEE Network, vol. 31, no. 2, pp. 80-89, April
2017. [289] M.-S. Lin, J.-S. Leu, W.-C. Yu, M.-C. Yu and J.-L. C. Wu, "On
transmission efficiency of the multimedia service over IEEE
[272] C. Goursaud and J.-M. Gorce, "Dedicated networks for IoT : PHY 802.15.4 Wireless Sensor Networks," in 13th International
/ MAC state of the art and challenges," EAI Endorsed Conference on Advanced Communication Technology
Transactions on the Internet of Things, vol. 1, no. 1, Oct. 2015. (ICACT2011), Seoul, 2011.
[273] J. Tan and S. G. Koo, "A Survey of Technologies in Internet of [290] C. Pham, V. Lecuire and J. Moureaux, "Performances of multi-
Things," in 2014 IEEE International Conference on Distributed hops image transmissions on IEEE 802.15.4 Wireless Sensor
Computing in Sensor Systems, Marina Del Rey, CA, 2014. Networks for surveillance applications," in 2013 IEEE 9th
[274] N. Salman, I. Rasool and A. H. Kemp, "Overview of the IEEE International Conference on Wireless and Mobile Computing,
802.15.4 standards family for Low Rate Wireless Personal Area Networking and Communications (WiMob), Lyon, 2013.

50

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[291] L. D. P. Mendes, . J. J. P. C. Rodrigues, J. Lloret and S. Sendra, [308] I. Farris, T. Taleb, Y. Khettab and J. Song, "A Survey on
"Cross-Layer Dynamic Admission Control for Cloud-Based Emerging SDN and NFV Security Mechanisms for IoT Systems,"
Multimedia Sensor Networks," IEEE Systems Journal, vol. 8, no. IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp.
1, pp. 235-246, March 2014. 812-837, Firstquarter 2019.
[292] C. T. Kone, A. Hafid and M. Boushaba, "Performance [309] I. M. Wirawan, I. D. Wahyono, G. Idfi and G. R. Kusumo, "IoT
Management of IEEE 802.15.4 Wireless Sensor Network for Communication System Using Publish-Subscribe," in 2018
Precision Agriculture," IEEE Sensors Journal, vol. 15, no. 10, pp. International Seminar on Application for Technology of
5734-5747, Oct. 2015. Information and Communication, Semarang, 2018.
[293] D.-M. Han and J.-H. Lim, "Smart home energy management [310] J. Deogirikar and A. Vidhate, "A Comprehensive Development
system using IEEE 802.15.4 and Zigbee," IEEE Transactions on and Testing of Improved Publish-Subscribe Method For IoT," in
Consumer Electronics, vol. 56, no. 3, pp. 1403-1410, Aug. 2010. 2018 Second International Conference on Inventive
[294] R. Ali, S. W. Kim, B.-S. Kim and Y. Park, "Design of MAC layer Communication and Computational Technologies (ICICCT),
resource allocation schemes for IEEE 802.11ax: Future Coimbatore, 2018.
directions," IETE Technical Review, vol. 35, no. 1, pp. 28-52, [311] A. Hakiri, P. Berthou, A. Gokhale and S. Abdellatif,
February 2018. "Publish/subscribe-enabled software defined networking for
[295] R. Ali, N. Shahin, R. Bajracharya, B.-S. Kim and S. W. Kim, "A efficient and scalable IoT communications," IEEE
Self-Scrutinized Backoff Mechanism for IEEE 802.11ax in 5G Communications Magazine, vol. 53, no. 9, pp. 48-54, September
Unlicensed Networks," MDPI Sustainability, vol. 10, no. 4, pp. 1- 2015.
15, April 2018. [312] D. Mera, M. Batko and P. Zezula, "Towards Fast Multimedia
[296] R. Ali, Y. Kim, B. Kim and S. W. Kim, "Channel observation- Feature Extraction: Hadoop or Storm," in 2014 IEEE
based scaled backoff mechanism for high-efficiency WLANs," International Symposium on Multimedia, Taichung, 2014.
Electronics Letters, vol. 54, no. 10, pp. 663-665, May 2018. [313] M. MAZHER, A. A. AZIZ, A. S. MALIK and H. U. AMIN, "An
[297] N. Shahin, R. Ali, S. W. Kim and Y.-T. Kim, "Cognitive backoff EEG-Based Cognitive Load Assessment in Multimedia Learning
mechanism for IEEE802.11ax high-efficiency WLANs," Journal Using Feature Extraction and Partial Directed Coherence," IEEE
of Communications and Networks, vol. 21, no. 2, pp. 158-167, Access, vol. 5, pp. 14819-14829, July 2017.
April 2019. [314] S. Kiranyaz, M. Ferreira and M. Gabbouj, "Automatic Object
[298] R. Ali, N. Shahin, Y. B. Zikria, B.-S. Kim and S. W. Kim, "Deep Extraction Over Multiscale Edge Field for Multimedia Retrieval,"
Reinforcement Learning Paradigm for Performance Optimization IEEE Transactions on Image Processing, vol. 15, no. 12, pp.
of Channel Observation–Based MAC Protocols in Dense 3759-3772, Dec. 2006.
WLANs," IEEE Access, vol. 7, pp. 3500-3511, 2019. [315] S. Chen, "Multimedia Deep Learning," IEEE MultiMedia, vol. 26,
[299] R. Ali, Y. A. Qadri, Y. B. Zikria, T. Umer, B.-S. Kim and S. W. no. 1, pp. 5-7, 1 Jan.-March 2019.
Kim, "Q-learning-enabled channel access in next-generation [316] T. Zhang, W. Zheng, Z. Cui, Y. Zong, J. Yan and K. Yan, "A Deep
dense wireless networks for IoT-based eHealth systems," Journal Neural Network-Driven Feature Learning Method for Multi-view
on Wireless Communications and Networking, vol. 178, pp. 1-12, Facial Expression Recognition," IEEE Transactions on
July 2019. Multimedia, vol. 18, no. 12, pp. 2528-2536, Dec. 2016.
[300] R. Ali, A. Nauman, Y. B. Zikria and S. W. Kim, "Performance [317] Y. Yang, H.-Y. Ha, F. C. Fleites and S.-C. Chen, "A Multimedia
optimization of QoS-supported dense WLANs using machine- Semantic Retrieval Mobile System Based on HCFGs," IEEE
learning-enabled enhanced distributed channel access (MEDCA) MultiMedia, vol. 21, no. 1, pp. 36-46, Mar. 2014.
mechanism," Neural Computing and Applications, (accepted), [318] Q. Wang, W. Wang and K. Sohraby, "Multimedia Relay Resource
2019. Allocation for Energy Efficient Wireless Networks: High-Layer
[301] J. Chen, K. Hu, Q. Wang, Y. Sun, Z. Shi and S. He , "Narrowband Content Prioritization With Low-Layer Diversity Cooperation,"
Internet of Things: Implementations and Applications," IEEE IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp.
Internet of Things Journal, vol. 4, no. 6, pp. 2309-2314, Dec. 10394-10405, Nov. 2017.
2017. [319] L. Fan, H. Du, U. Mudugamuwa and B. G. Evans, "A Cross-Layer
[302] G. Tsoukaneri, M. Condoluci, T. Mahmoodi, M. Dohler and M. Delay Differentiation Packet Scheduling Scheme for Multimedia
K. Marina, "Group Communications in Narrowband-IoT: Content Delivery in 3G Satellite Multimedia Systems," IEEE
Architecture, Procedures, and Evaluation," IEEE Internet of Transactions on Broadcasting, vol. 54, no. 4, pp. 806-815, Dec.
Things Journal, vol. 5, no. 3, pp. 1539-1549, June 2018. 2008.
[303] C. Yu, L. Yu , Y. Wu, Y. He and Q. Lu, "Uplink Scheduling and [320] M. Jafari and S. Kasaei, "Prioritisation of data partitioned MPEG-
Link Adaptation for Narrowband Internet of Things Systems," 4 for streaming video in GPRS mobile networks," in 2005 1st
IEEE Access, vol. 5, pp. 1724-1734, Feb. 2017. IEEE and IFIP International Conference in Central Asia on
[304] Y. Li, K. Chi, H. Chen, Z. Wang and Y. Zhu, "Narrowband Internet, Bishkek, 2005.
Internet of Things Systems With Opportunistic D2D [321] J. Kang and W. Sung, "A multi-level block priority based
Communication," IEEE Internet of Things Journal, vol. 5, no. 3, instruction caching scheme for multimedia processors," in 2001
pp. 1474-1484, June 2018. IEEE Workshop on Signal Processing Systems. SiPS 2001. Design
[305] M. Collotta and G. Pau, "A Novel Energy Management Approach and Implementation (Cat. No.01TH8578), Antwerp, Belgium,
for Smart Homes Using Bluetooth Low Energy," IEEE Journal 2001.
on Selected Areas in Communications, vol. 33, no. 12, pp. 2988- [322] A. Iera, A. Molinaro, G. Ruggeri and D. Tripodi, "Dynamic
2996, Dec. 2015. prioritization of multimedia flows for improving QoS and
[306] K. Sood, S. Yu and Y. Xiang, "Software-Defined Wireless throughput in IEEE 802.11e WLANs," in IEEE International
Networking Opportunities and Challenges for Internet-of-Things: Conference on Communications, 2005. ICC, Seoul, 2005.
A Review," IEEE Internet of Things Journal, vol. 3, no. 4, pp. [323] R. Gnanajeyaraman, M. Ganeshkumar and C. Manojkumar,
453-463, Aug. 2016. "Performance and analysis of prioritization security for input-
[307] R. Amin, M. Reisslein and N. Shah, "Hybrid SDN Networks: A queued packet switches," in 2010 International Conference on
Survey of Existing Approaches," IEEE Communications Surveys Communication and Computational Intelligence (INCOCCI),
& Tutorials, vol. 20, no. 4, pp. 3259-3306, May 2018. Erode, 2010.

51

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[324] M. van der Schaar and D. S. Turaga, "Cross-Layer Packetization [340] M. A. Rahman, M. S. Hossain, G. Loukas, E. Hassanain, S. S.
and Retransmission Strategies for Delay-Sensitive Wireless Rahman, M. F. Alhamid and M. Guizani, "Blockchain-Based
Multimedia Transmission," IEEE Transactions on Multimedia, Mobile Edge Computing Framework for Secure Therapy
vol. 9, no. 1, pp. 185-197, Jan. 2007. Applications," IEEE Access, vol. 6, pp. 72469-72478, Nov. 2018.
[325] W. ROUSH, "MIT Technology Review: tr10-peering-into- [341] M. A. Rahman, E. Hassanain and M. M. Rashid, "Spatial
videos-future," 12 March 2007. [Online]. Available: Blockchain-Based Secure Mass Screening Framework for
http://www2.technologyreview.com/news/407469/tr10-peering- Children With Dyslexia," IEEE Access, vol. 6, pp. 61876-61885,
into-videos-future/. [Accessed 29 June 2019]. Oct. 2018.
[326] E. Amid, A. Mesaros, K. J. Palomaki, J. Laaksonen and M. [342] J. Xu, J. Jiang, Z. Wang and Y. Zhao, "Energy Harvesting Multi-
Kurimo, "Unsupervised feature extraction for multimedia event path Routing for Wireless Multimedia Nanosensor Networks in
detection and ranking using audio content," in 2014 IEEE Terahertz Band," in 2018 14th International Wireless
International Conference on Acoustics, Speech and Signal Communications & Mobile Computing Conference (IWCMC),
Processing (ICASSP), Florence, 2014. Limassol, 2018.
[327] S. Wu, X. Zhuang and P. Natarajan, "Effective representations for [343] X. Huang, R. Yu, J. Kang, Y. Gao, S. Maharjan, S. Gjessing and
leveraging language content in multimedia event detection," in Y. Zhang, "Software Defined Energy Harvesting Networking for
2014 IEEE International Conference on Acoustics, Speech and 5G Green Communications," IEEE Wireless Communications,
Signal Processing (ICASSP), Florence, 2014. vol. 24, no. 4, pp. 38-45, Aug. 2017.
[328] Z. Ma, X. Chang, Z. Xu, N. Sebe and A. G. Hauptmann, "Joint [344] N. Vo, T. Q. Duong, H. Zepernick and M. Fiedler, "A Cross-Layer
Attributes and Event Analysis for Multimedia Event Detection," Optimized Scheme and Its Application in Mobile Multimedia
IEEE Transactions on Neural Networks and Learning Systems, Networks With QoS Provision," IEEE Systems Journal, vol. 10,
vol. 29, no. 7, pp. 2921-2930, July 2018. no. 2, pp. 817-830, June 2016.
[329] L. Xie, H. Sundaram and M. Campbell, "Event Mining in [345] J.-L. Hsu and M. van der Schaar, "Cross Layer Design and
Multimedia Streams," Proceedings of the IEEE, vol. 96, no. 4, pp. Analysis of Multiuser Wireless Video Streaming Over 802.11e
623-647, April 2008. EDCA," IEEE Signal Processing Letters, vol. 16, no. 4, pp. 268-
[330] T. Ma, M. Hempel, D. Peng and H. Sharif, "A Survey of Energy- 271, April 2009.
Efficient Compression and Communication Techniques for [346] W. Wang, "Collaborative Multimedia Source-Protocol
Multimedia in Resource Constrained Systems," IEEE Coordination: A Cross-Layer QoE Study in Modern Wireless
Communications Surveys & Tutorials, vol. 15, no. 3, pp. 963-972, Networks," IEEE Systems Journal, vol. 11, no. 4, pp. 2403-2409,
July 2012. Dec. 2017.
[331] S. Misra, M. Reisslein and G. Xue, "A survey of multimedia [347] Z. Chang, Y. Hu, Y. Chen and B. Zeng, "Cluster-Oriented Device-
streaming in wireless sensor networks," IEEE Communications to-Device Multimedia Communications: Joint Power, Bandwidth,
Surveys & Tutorials, vol. 10, no. 4, pp. 18-39, Fourth Quarter and Link Selection Optimization," IEEE Transactions on
2008. Vehicular Technology, vol. 67, no. 2, pp. 1570-1581, Feb. 2018.
[332] M. A. Jamshed, A. Nauman, M. F. Khan and M. I. Khan, "An [348] J. Yan, D. Wu and R. Wang, "Socially Aware Trust Framework
energy efficient scheduling mechanism using concept of light for Multimedia Delivery in D2D Cooperative Communication,"
weight processors for Wireless Multimedia Sensor Networks," in IEEE Transactions on Multimedia, vol. 21, no. 3, pp. 625-635,
2017 14th International Bhurban Conference on Applied Sciences March 2019..
and Technology (IBCAST), Islamabad, 2017. [349] A. Nauman, M. A. Jamshed, Y. Ahmad, R. Ali, Y. B. Zikria and
[333] J. M. Jimenez, J. R. Diaz, J. Lloret and O. Romero , "MHCP: S. W. Kim, "An Intelligent Deterministic D2D Communication in
Multimedia Hybrid Cloud Computing Protocol and Architecture Narrow-band Internet of Things," in 2019 15th International
for Mobile Devices," IEEE Network, vol. 33, no. 1, pp. 106-112, Wireless Communications & Mobile Computing Conference
January/February 2019.. (IWCMC), Tangier, Morocco, 2019.
[334] P. Juluri, V. Tamarapalli and D. Medhi, "Measurement of Quality [350] L. Zhou, D. Wu, J. Chen and Z. Dong, "Greening the Smart Cities:
of Experience of Video-on-Demand Services: A Survey," IEEE Energy-Efficient Massive Content Delivery via D2D
Communications Surveys & Tutorials, vol. 18, no. 1, pp. 401-418, Communications," IEEE Transactions on Industrial Informatics,
Firstquarter 2016. vol. 14, no. 4, pp. 1626-1634, April 2018..
[335] Z. He, S. Mao and S. Kompella, "A Decomposition Approach to [351] A. M. Mezher and M. A. Igartua, "Multimedia Multimetric Map-
Quality-Driven Multiuser Video Streaming in Cellular Cognitive Aware Routing Protocol to Send Video-Reporting Messages Over
Radio Networks," IEEE Transactions on Wireless VANETs in Smart Cities," IEEE Transactions on Vehicular
Communications, vol. 15, no. 1, pp. 728-739, Jan. 2016. Technology, vol. 66, no. 12, pp. 10611-10625, Dec. 2017.
[336] L. Li, G. Wen, Z. Wang and . Y. Yang, "Efficient and Secure [352] B. Ahlgren, M. Hidell and E. C. Ngai, "Internet of Things for
Image Communication System Based on Compressed Sensing for Smart Cities: Interoperability and Open Data," IEEE Internet
IoT Monitoring Applications," IEEE Transactions on Multimedia. Computing, vol. 20, no. 6, pp. 52-56, Dec. 2016.
[337] J. Suryadevara, B. Sunil and N. Kumar, "Secured multimedia [353] X. Ge, X. Huang, Y. Wang, M. Chen, Q. Li, T. Han and C.-X.
authentication system for wireless sensor network data related to Wang, "Energy-Efficiency Optimization for MIMO-OFDM
Internet of Things," in 2013 Seventh International Conference on Mobile Multimedia Communication Systems With QoS
Sensing Technology (ICST), Wellington, 2013. Constraints," IEEE Transactions on Vehicular Technology, vol.
[338] Y. Zhang, Y. Qian, D. Wu, M. S. Hossain, A. Ghoneim and M. 63, no. 5, pp. 2127-2138, Jun 2014.
Chen, "Emotion-Aware Multimedia Systems Security," IEEE [354] S. He and W. Wang, "Multimedia Upstreaming Cournot Game in
Transactions on Multimedia, vol. 21, no. 3, pp. 617-624, March Non-Orthogonal Multiple Access Internet of Things," IEEE
2019. Transactions on Network Science and Engineering, (Early
[339] G. Gianini, M. Anisetti, A. Azzini, V. Bellandi, E. Damiani and Access).
S. Marrara, "An artificial immune system approach to anomaly [355] J. Montalban, P. Scopelliti, M. Fadda, E. Iradier, C. Desogus, P.
detection in multimedia ambient intelligence," in 2009 3rd IEEE Angueira, M. Murroni and G. Araniti, "Multimedia Multicast
International Conference on Digital Ecosystems and Services in 5G Networks: Subgrouping and Non-Orthogonal
Technologies, Istanbul, 2009. Multiple Access Techniques," IEEE Communications Magazine,
vol. 56, no. 3, pp. 91-95, March 2018.

52

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

[356] D. Soldani, Y. J. Guo, B. Barani , P. Mogensen, C.-L. I and S. K. ALI NAUMAN is a Ph.D. candidate in the
Das, "5G for Ultra-Reliable Low-Latency Communications," Wireless Information Networking Laboratory
IEEE Network, vol. 32, no. 2, pp. 6-7, March-April 2018.. (WINLab) at the Department of Information and
Communication Engineering, Yeungnam
[357] K. S. Kim, D. K. Kim, C.-B. Chae, S. Choi and Y.-C. Ko,
University, Gyeongsangbuk-do, the Republic of
"Ultrareliable and Low-Latency Communication Techniques for
Korea. He received his B.E. degree in electrical
Tactile Internet Services," Proceedings of the IEEE, vol. 107, no.
(telecommunication) engineering from
2, pp. 376-393, Feb. 2019.
COMSATS University Islamabad, Pakistan in
[358] M. Chen, Y. Miao, Y. Hao and K. Hwang, "Narrow Band Internet 2013 and M.S. degree in wireless
of Things," IEEE Access, vol. 5, pp. 20557-20577, 2017. communications from Institute of Space
[359] S. J. Nawaz, S. K. Sharma, S. Wyne, M. N. Patwary and M. Technology Islamabad, Pakistan in 2016. From
Asaduzzaman, "Quantum Machine Learning for 6G August 2013 to July 2014, he worked as Engineer at Inbox Business
Communication Networks: State-of-the-Art and Vision for the Technologies, Pakistan. From August 2014 to March 2017, he worked as
Future," IEEE Access, vol. 7, pp. 46317-46350, 2019. an Operations and Maintenance Manager at Mobiserve, Pakistan. From
April 2017 to August 2018, he was a Researcher at Institute of Space
[360] B. Ma, H. Shah-Mansouri and V. W. S. Wong, "Multimedia
Technology, Islamabad Pakistan. His research interests are focused in the
Content Delivery in Millimeter Wave Home Networks," IEEE
area of wireless multimedia communication in the Internet of Things,
Transactions on Wireless Communications, vol. 15, no. 7, pp.
wireless multimedia sensor networks, wireless communication via high
4826-4838, July 2016.
altitude platforms, software defined networks, resource management and
[361] D. Jo and G. J. Kim, "ARIoT: scalable augmented reality machine learning.
framework for interacting with Internet of Things appliances
everywhere," IEEE Transactions on Consumer Electronics, vol.
62, no. 3, pp. 334-340, August 2016..
[362] P. Fraga-Lamas, T. M. Fernández-Caramés, Ó. Blanco-Novoa and
M. A. Vilar-Montesinos, "A Review on Industrial Augmented
Reality Systems for the Industry 4.0 Shipyard," IEEE Access, vol.
6, pp. 13358-13375, 2018.
[363] L. Zhang, S. Chen, H. Dong and A. El Saddik, "Visualizing
Toronto City Data with HoloLens: Using Augmented Reality for
a City Model," IEEE Consumer Electronics Magazine, vol. 7, no.
3, pp. 73-80, May 2018. YAZDAN AHMAD QADRI received his
Master's and Bachelor’s degree in electronics
[364] K. S. Kim et al, "Ultrareliable and Low-Latency Communication and communication engineering from L.P.
Techniques for Tactile Internet Services," Proceedings of the University, India. He completed his M. Tech
IEEE, vol. 107, no. 2, pp. 376-393, Feb. 2019. program in 2016 with a focus on digital signal
[365] IEEE, "IEEE Standards Association," 22 Sep. 2016. [Online]. processing. He is currently pursuing his PhD
Available: https://standards.ieee.org/project/1918_1_1.html. from the Department of Information and
[Accessed 02 August 2019]. Communication Engineering, Yeungnam
[366] E. Steinbach et al., "Haptic Codecs for the Tactile Internet," University, South Korea. His research targets
Proceedings of the IEEE, vol. 107, no. 2, pp. 447-470, Feb. 2019. Medicine 4.0 enabling technologies
encompassing IoT, Edge Computing, SDN and
[367] Y. Sheng, "Scalable Intelligence-Enabled Networking with AI.
Traffic Engineering in 5G Scenarios for Future Audio-Visual-
Tactile Internet," IEEE Access, vol. 6, pp. 30378-30391, 2018.
[368] S. Sukhmani, M. Sadeghi, M. Erol-Kantarci and A. El Saddik,
"Edge Caching and Computing in 5G for Mobile AR/VR and
Tactile Internet," IEEE MultiMedia, vol. 26, no. 1, pp. 21-30, Jan.-
March 2019.
[369] S. Dixit, S. Mohan, R. Prasad and H. Harada, "Multi-Sensory
Human Bond Communication," IEEE Communications
Magazine, vol. 57, no. 2, pp. 18-18, February 2019.
[370] I. F. Akyildiz, M. Pierobon, S. Balasubramaniam and Y.
Koucheryavy, "The internet of Bio-Nano things," IEEE
Communications Magazine, vol. 53, no. 3, pp. 32-40, March 2015.
[371] T. Suda and T. Nakano, "Molecular Communication: A Personal
Perspective," IEEE Transactions on NanoBioscience, vol. 17, no.
4, pp. 424-432, Oct. 2018. MUHAMMAD AMJAD received the B.S.
degree in telecommunication systems from
Bahauddin Zakariya University, Multan,
Pakistan and the M.S. degree in computer
science from the COMSATS Institute of
Information Technology, Islamabad, Pakistan,
in 2011 and 2016, respectively. He is currently
pursuing the Ph.D. degree with the School of
Computer Science and Electronics Engineering,
University of Essex. His research interests
include cognitive radio networks, wireless
sensor networks, vehicular ad-hoc networks, and electrical vehicles. He
was a recipient of the Best Paper Award at ACM 7th International
Conference on Computing Communication and Networking
Technologies, USA, in 2016 and the Best Reviewer of the Year 2016
Award from Elsevier, Computers and Electrical Engineering Journal.

53

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2020.2964280, IEEE Access

YOUSAF BIN ZIKRIA (SM’ 17) is currently SUNG WON KIM received his B.S. and M.S.
working as an Assistant Professor in the degrees from the Department of Control and
department of Information and Communication Instrumentation Engineering, Seoul National
Engineering, College of Engineering, University, Korea, in 1990 and 1992,
Yeungnam University, Gyeongsan-Si, South respectively, and his Ph.D. degree from the
Korea. He has more than 10 years of experience School of Electrical Engineering and Computer
in research, academia and industry in the field of Sciences, Seoul National University, Korea, in
Information and Communication engineering, August 2002. From January 1992 to August
and Computer science. He received his Ph.D. 2001, he was a Researcher at the Research and
degree from the Department of Information and Development Center of LG Electronics, Korea.
Communication Engineering, Yeungnam From August 2001 to August 2003, he was a
University, Korea, in 2016. His research interests include IoT, 5G, Researcher at the Research and Development Center of AL Tech, Korea.
wireless communications and networks, opportunistic communications, From August 2003 to February 2005, he was a Postdoctoral Researcher in
wireless sensor networks, routing protocols, cognitive radio ad hoc the Department of Electrical and Computer Engineering, University of
networks, cognitive radio ad hoc sensor networks, transport protocols, Florida, Gainesville, USA. In March 2005, he joined the Department of
VANETS, embedded system and information security. He is the Information and Communication Engineering, Yeungnam University,
associate/guest editor of FT/SI for FT/SI on Unlocking 5G Spectrum Gyeongsangbuk-do, Korea, where he is currently a Professor. His
Potential for Intelligent IoT: Opportunities, Challenges and Solutions for research interests include resource management, wireless networks,
IEEE Communications Magazine, Tactile Internet: Technologies, Test mobile computing, performance evaluation, and machine learning.
Platforms, Trials, and Applications and, Internet of Things (IoT):
Operating System, Applications and Protocols Design, and Validation
Techniques for Elsevier Future Generation Computer Systems (FGCS),
Deep Learning for Intelligent IoT: Opportunities, Challenges and
Solutions for Elsevier Computer Communications, Data Driven
Intelligence in Wireless Networks: Issues, Challenges, and Solution, for
Transactions for Emerging Telecommunications Technologies
(ETT),Internet of Things (IoT) Operating Systems Management:
Opportunities, Challenges, Solution and Internet of Multimedia Things
(M-IoT): Opportunities, Challenges and Solutions for MDPI Sensors and
5G Mobile Services and Scenarios: Challenges and Solutions for MDPI
Sustainability. He is also serving as the reviewer of IEEE
Communications Surveys and Tutorials, IEEE Communications
Magazine, IEEE Communications Letters, IEEE Sensors, IEEE
ACCESS, IEEE IT Professional, Elsevier Future Generation Computer
Systems, Elsevier Computer Standards and Interfaces, Springer the
Journal of Supercomputing, Sage International Journal of Distributed
Sensor Networks, and KSII Transactions on Internet and Information
Systems. He is the recipient of the excellent paper award of ICIDB 2016
Conference and fully funded scholarship for Masters and Ph.D. He held
the prestigious CISA, JNCIS-SEC, JNCIS-ER, JNCIA-ER, JNCIA-EX,
and Advance Routing Switching and WAN Technologies certifications.

MUHAMMAD KHALIL AFZAL (SM’ 16)


received his B.S and M.S degrees in computer
science from COMSATS Institute of Information
Technology, Wah Campus, Pakistan in 2004 and
2007, respectively and his PhD. Degree from
Department of Information and Communication
Engineering, Yeungnam University, South
Korea, in December 2014. He has served as
lecturer from January 2008 to November 2009 in
Bahauddin Zakariya University Multan Pakistan,
and from December 2009 to June 2011 in King
Khalid University Abha, Saudi Arabia. Currently, he is working as
Assistant Professor in Department of Computer Science at COMSATS,
Wah Cantt Pakistan. He is serving as a Guest Editor of IEEE
Communication Magazine, Transactions for Emerging
Telecommunications Technologies (ETT), Future Generation Computer
Systems (Elsevier), IEEE ACCESS, Journal of Ambient Intelligence and
Humanized Computing (Springer), and reviewer for IEEE ACCESS,
Computers and Electrical Engineering (Elsevier), Journal of Network and
Computer Applications (Elsevier), FGCS, and IEEE transaction on
Vehicular Technology. He is the recipient of the best paper awards of
ACM 7th International Conference on Computing Communication and
Networking Technologies and in International Conference on Green and
Human Information Technology (ICGHIT-2018) and fully funded
scholarship for Masters and Ph.D. His research interest includes wireless
sensor networks, ad hoc networks, Data driven intelligence in wireless
networks, Smart Cities, 5G, and IoT.

54

This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/.

You might also like