Skip to main content
Log in

Game theoretic decision making in IoT-assisted activity monitoring of defence personnel

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Innovative growth of IoT Technology has enhanced the service delivery aspects of defence sector in terms of high-tech surveillance, and reliable defence mechanisms. Along with the sensing capability for ubiquitous events, IoT Technology provides means to deliver services in time sensitive and information intensive manner. In this paper, a framework for IoT based activity monitoring of defence personnel is presented to detect the precursors of suspiciousness in terms of information outflow that can compromise the national security. Though maintaining intellectual defence personnel remained a major area of concern for every nation, still investigating reports of recent terrorist attacks in different countries have discovered the number of suspicion factors from their daily activities. The work presented in this study focuses on these factors in terms of efficient monitoring of social activities and analyzing it over suspicious scale. Moreover, Suspicious Index (SI) is defined for every personnel on the basis of their activities that can compromise national security directly or indirectly. Furthermore, automated game theoretic decision making model is presented to aid the monitoring officials in suppressing the probability of information outflow. In order to validate the system, two types of evaluations are performed. In one case, an imitative environment is considered to monitor 10 college students’ daily engagements for 7 days. The results are compared with the state-of-the-art techniques of data assessment. In the second case, a mathematical evaluation for the game theoretic decision making is performed. Results in both cases show that the proposed model achieves better performance in efficient monitoring of suspicious activities and effective decision making.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Acampora G, Gaeta M, Loia V, Vasilakos AV (2010) Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Trans Auton Adapt Syst (TAAS). doi:10.1145/1740600.1740604

  2. Aggarwal CC, Zhai C (2012) Mining text data. Springer Science & Business Media

  3. Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols and applications. IEEE Commun Surv Tutorials 17:2347–2376. doi:10.1109/COMST.2015.2444095

    Article  Google Scholar 

  4. Antonić A, Marjanović M, Pripui K, Zarko IP (2016) A mobile crowd sensing ecosystem enabled by CUPUS: Cloud-based publish/subscribe middleware for the Internet of Things. Futur Gener Comput Syst 56:607–622. doi:10.1016/j.future.2015.08.005

    Article  Google Scholar 

  5. Amazon Cloud Services. https://aws.amazon.com/ec2/. Accessed 14 January 2016

  6. Azzedin F, Yahaya M (2016) Modeling BitTorrent choking algorithm using game theory. Futur Gener Comput Syst 55:255–265. doi:10.1016/j.future.2015.02.007

    Article  Google Scholar 

  7. Baba AI, Lu H, Pedersen TB, Xie X (2013) A graph model for false negative handling in indoor RFID tracking data. In: 21st ACM international conference on advances in geographic information systems. ACM. doi:10.1145/2525314.2525461

  8. Barua S, Sander J (2014) Mining statistically significant co-location and segregation patterns. IEEE Trans Knowl Data Eng 26:1185–1199. doi:10.1109/TKDE.2013.88

    Article  Google Scholar 

  9. Bjelopera JP, Randol MA (2011) The Federal Bureau of Investigation and Terrorism Investigations. In: Congressional research service, library of congress. https://fas.org/sgp/crs/terror/R41780.pdf. Accessed 10 January 2016

  10. Bosch X (2012) Beyond 9/11: health consequences of the terror attacks outside the USA. Intern Emerg Med 7:159–161. doi:10.1007/s11739-011-0748-7

    Article  Google Scholar 

  11. Castillejo P, Martinez JF, Rodriguez-Molina J, Cuerva A (2013) Integration of wearable devices in a wireless sensor network for an E-health application. IEEE Wirel Commun 20:38–49. doi:10.1109/MWC.2013.6590049

    Article  Google Scholar 

  12. Chen C, Huang J, He L, Li H (2014) Preconditioning for accelerated iteratively reweighted least squares in structured sparsity reconstruction. In: IEEE conference on computer vision and pattern recognition. doi:10.1109/CVPR.2014.353

  13. Chen G, Kotz D (2000) A survey of context-aware mobile computing research. https://pdfs.semanticscholar.org/0c50/772e92971458402205097a67a2fd015575fd.pdf. Accessed 10 January 2016

  14. Chen Z, Xia F, Huang T, Bu F, Wang H (2013) A localization method for the Internet of Things. J Supercomput 63:657–674. doi:10.1007/s11227-011-0693-2

    Article  Google Scholar 

  15. Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10:2233–2243. doi:10.1109/TII.2014.2300753

    Article  Google Scholar 

  16. Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51:107–113. doi:10.1145/1327452.1327492

    Article  Google Scholar 

  17. De Martino B, Kumaran D, Seymour B, Dolan RJ (2006) Frames, biases, and rational decision-making in the human brain. Science 313:684–687. doi:10.1126/science.1128356

    Article  Google Scholar 

  18. Ding G, Guo Y, Zhou J, Gao Y (2016) Large-Scale Cross-Modality Search via Collective Matrix Factorization Hashing. IEEE Trans Image Process 25:5427–5440. doi:10.1109/TIP.2016.2607421

    Article  MathSciNet  Google Scholar 

  19. Fang S, Xu L, Pei H, Liu Y, Liu Z, Zhu Y, Zhang H (2014) An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans Ind Inform 10:548–558. doi:10.1109/TII.2013.2257807 10.1109/TII.2013.2257807

    Article  Google Scholar 

  20. Flouvat F, Nguyen Van Soc JF, Desmier E, Selmaoui-Folcher N (2015) Domain-driven co-location mining. Geoinformatica 19:147–183. doi:10.1007/s10707-014-0209-3

    Article  Google Scholar 

  21. Ganz F, Barnaghi P, Carrez F (2013) Information abstraction for heterogeneous real world internet data. IEEE Sensors J 13:3793–3805. doi:10.1109/JSEN.2013.2271562

    Article  Google Scholar 

  22. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29:1645–1660. doi:10.1016/j.future.2013.01.010

    Article  Google Scholar 

  23. Hanjalic A, Xu L-Q (2005) Affective video content representation and modeling. IEEE Trans Multimedia 7:143–154. doi:10.1109/TMM.2004.840618

    Article  Google Scholar 

  24. Harwood B (2016) FANNG: Fast Approximate Nearest Neighbour Graphs. In: IEEE conference on computer vision and pattern recognition (CVPR). doi:10.1109/CVPR.2016.616

  25. He C, Fan X (2013) Toward ubiquitous healthcare services with a novel efficient cloud platform. IEEE Trans Biomed Eng 60:230–234. doi:10.1109/TBME.2012.2222404

    Article  Google Scholar 

  26. Hirsch M, Carli P, Nizard R, Riou B, Baroudjian B, Baubet T, Fontaine JP (2015) The medical response to multisite terrorist attacks in Paris. Lancet 386:2535–2538. doi:10.1016/S0140-6736(15)01063-6

    Article  Google Scholar 

  27. Huang Y, Pei J, Xiong H (2006) Mining co-location patterns with rare events from spatial data sets. Geoinformatica 10:239–260. doi:10.1007/s10707-006-9827-8

    Article  Google Scholar 

  28. IBM SPSS Statistics Software. http://www01.ibm.com/software/analytics/spss/. Accessed 30 January 2016

  29. James B, Takabi H, Ahn G (2010) Security and privacy challenges in cloud computing environments. IEEE Secur Priv 8:24–31. doi:10.1109/MSP.2010.186

    Article  Google Scholar 

  30. Kaur N, Sood SK (2015) Cognitive decision making in smart industry. Comput Ind 74:151–161. doi:10.1016/j.compind.2015.06.006

    Article  Google Scholar 

  31. Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sensors J 13:3846–3853. doi:10.1109/JSEN.2013.2263379 10.1109/JSEN.2013.2263379

    Article  Google Scholar 

  32. Kontschieder P, Fiterau M, Criminisi A, Rota Bulo S (2015) Deep neural decision forests. In: IEEE international conference on computer vision (ICVR). doi:10.1109/ICCV.2015.172

  33. Kronstadt KA (2008) Terrorist attacks in Mumbai, India, and implications for US interests. In: Library of congress washington DC congressional research service. http://www.dtic.mil/get-tr-doc/pdf?AD=ADA492902. Accessed 2 January 2016

  34. Kumar S, Udupa R (2011) Learning hash functions for cross-view similarity search. In: International joint conference on artificial intelligence. doi:10.5591/978-1-57735-516-8/IJCAI11-230

  35. Lauría EJ, Duchessi PJ (2006) A Bayesian belief network for IT implementation decision support. Decis Support Syst 42:573–1588. doi:10.1016/j.dss.2006.01.003

    Article  Google Scholar 

  36. Leye W (2016) Facilitating Mobile Crowdsensing from both Organizers’ and Participants’ Perspectives. Dissertation.Telecom SudParis

  37. Li S, Da Xu L, Wang X (2013) Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans Ind Inform 9:2177–2186. doi:10.1109/TII.2012.2189222

    Article  Google Scholar 

  38. Liang M, Hu X (2015) Recurrent convolutional neural network for object recognition. In: IEEE conference on computer vision and pattern recognition (CVPR). doi:10.1109/CVPR.2015.7298958

  39. Lin Z, Ding G, Han J, Wang J Cross-view retrieval via probability-based semanticspreserving hashing. IEEE Transactions on Cybernetics. doi:10.1109/TCYB.2016.2608906

  40. Lin J, Keogh E, Wei L, Lonardi S (2007) Experiencing sax: a novel symbolic representation of time series. Data Min Knowl Disc 15:107–144. doi:10.1007/s10618-007-0064-z

    Article  MathSciNet  Google Scholar 

  41. Liu Y, Xu L, Li M (2016) The Parallelization of Back Propagation Neural Network in MapReduce and Spark. Int J Parallel Prog. doi:10.1007/s10766-016-0401-1

  42. Lu G, Yan Y, Sebe N, Kambhamettu C (2014) Knowing Where I Am: Exploiting Multi-Task Learning for Multi-view Indoor Image-based Localization. BMVC. doi:10.5244/C.28.125

  43. Manikonda L, Mangalampalli A, Pudi V (2010) UACI: Uncertain associative classifier for object class identification in images. In: Image and vision computing new zealand (IVCNZ). doi:10.1109/IVCNZ.2010.6148859

  44. Moreira-Matias L, Mendes-Moreira J, Gama J, Brazdil P (2012) Text categorization using an ensemble classifier based on a mean co-association matrix. In: International workshop on machine learning and data mining in pattern recognition. Springer, Berlin Heidelberg. doi:10.1007/978-3-642-31537-4_41

    Book  Google Scholar 

  45. Najafi B, Aminian K, Paraschiv-Ionescu A, Loew F, Bula CJ, Robert P (2003) Ambulatory system for human motion analysis using a kinematic sensor: monitoring of daily physical activity in the elderly. IEEE Trans Biomed Eng 50:711–723. doi:10.1109/TBME.2003.812189

    Article  Google Scholar 

  46. Nash J (1951) Non-cooperative games. Ann Math 54:286–295. doi:10.2307/1969529

    Article  MathSciNet  MATH  Google Scholar 

  47. Song J, Yang Y, Yang Y, Huang Z, Shen HT (2013) Inter-media hashing for large-scale retrieval from heterogeneous data sources. In: International conference on management of data. doi:10.1145/2463676.2465274 10.1145/2463676.2465274

  48. St J, Oniga S, Buchman A (2015) Real time human activity monitoring, vol 44. http://ami.ektf.hu/uploads/papers/finalpdf/AMI44from187to196.pdf. Accessed 10 January 2016

  49. Tan J (2015) A Game-Theoretic Framework for Vehicle-to-Grid Frequency Regulation Considering Smart Charging Mechanism. IEEE Trans Smart Grid. doi:10.1109/TSG.2016.2524020

  50. Tang J, Hua X-S., Wang M, Gu Z, Qi G-J., Wu X (2009) Correlative linear neighborhood propagation for video annotation. IEEE Trans Syst Man Cybern 39:409–416. doi:10.1109/TSMCB.2008.2006045 10.1109/TSMCB.2008.2006045

    Article  Google Scholar 

  51. Tong S, Chang E (2001) Support vector machine active learning for image retrieval. Ninth ACM international conference on Multimedia. doi:10.1145/500141.500159

  52. Wang Y, Wei J, Ren S, Shen Y (2016) Toward integrity assurance of outsourced computing a game theoretic perspective. Futur Gener Comput Syst 55:87–100. doi:10.1016/j.future.2015.08.010

    Article  Google Scholar 

  53. Wang F, Qi S, Gao G, Zhao S, Wang X (2016) Logo information recognition in large-scale social media data. Multimedia Systems 22:63–73. doi:10.1007/s00530-014-0393-x

    Article  Google Scholar 

  54. Wang L, Tao J, Ranjan R, Marten H, Streit A, Chen J, Chen D (2013) G-Hadoop: MapReduce across distributed data centers for data-intensive computing. Futur Gener Comput Syst 29:739–750. doi:10.1016/j.future.2012.09.001

    Article  Google Scholar 

  55. Xu Y., Agyemang B, Wu s., Liu M (2017) Procedure Graph Model For Automatic RFID Data Processing Service Management. IEEE Internet of Things Journal. doi:10.1109/JIOT.2017.2661326

  56. Xu B, Da Xu L, Cai H, Xie C, Hu J, Bu F (2014) Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Ind Inform 10:1578–1586. doi:10.1109/TII.2014.2306382

    Article  Google Scholar 

  57. Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trtans Circ Syst Video Technol 24:2077–2089. doi:10.1109/TCSVT.2014.2335852

    Article  Google Scholar 

  58. Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21:573–576. doi:10.1109/LSP.2014.2310494

    Article  Google Scholar 

  59. Zayani MH, Gauthier V, Slama I, Zeghlache D (2012) Tracking topology dynamicity for link prediction in intermittently connected wireless networks. In: 8th international wireless communications and mobile computing conference (IWCMC).IEEE. arXiv:1205.3328v1

  60. Zhang GA, Gu JY, Bao ZH, Xu C, Zhang SB (2014) Joint routing and channel assignment algorithms in cognitive wireless mesh networks. Trans Emerg Telecommun Technol 25:294–307. doi:10.1002/ett.2560

    Article  Google Scholar 

  61. Zhao S, Yao H, Gao Y, Ji R, Xie W, Jiang X, Chua TS (2016) Predicting personalized emotion perceptions of social images. In: Proceedings of the 2016 ACM on multimedia conference. ACM. doi:10.1145/2964284.2964289

  62. Zhao S, Yao H, Sun X (2013) Video classification and recommendation based on affective analysis of viewers. Neurocomputing 119:101–110. doi:10.1016/j.neucom.2012.04.042

    Article  Google Scholar 

  63. Zhao S, Yao H, Gao Y, Ji R, Ding G (2016) Continuous probability distribution prediction of image emotions via multi-task shared sparse regression. IEEE Transactions on Multimedia. doi:10.1109/TMM.2016.2617741

  64. Zheng J, Cai Y, Chen X, Li R, Zhang H (2015) Optimal base station sleeping in green cellular networks: A distributed cooperative framework based on game theory. IEEE Trans Wirel Commun 14:4391–4406. doi:10.1109/TWC.2015.2420233

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Munish Bhatia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhatia, M., Sood, S.K. Game theoretic decision making in IoT-assisted activity monitoring of defence personnel. Multimed Tools Appl 76, 21911–21935 (2017). https://doi.org/10.1007/s11042-017-4611-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4611-3

Keywords

Navigation