Opportunistic information fusion: a new paradigm for next generation networked sensing systems

Traditionally, information fusion systems assume that the information is gathered from known sensors over proprietary communication networks and fuse using fixed rules of information fusion and designated computing and communication resources. Emerging technologies like wireless sensor networks, TEDS enabled legacy sensors, ubiquitous computing devices and all IP next generation networks are challenging the rationale of conventional information fusion systems. The technology has matured to a point where it is reasonable to discover sensors based on the context, establish relevance, query for appropriate data, and fuse it using the most appropriate fusion rule, using ubiquitous computing and communication environment in an opportunistic manner. We define such fusion systems as opportunistic information fusion systems. In this paper we introduce this new paradigm for information fusion and identify plausible approaches and challenges to design, develop and deploy the proposed next generation opportunistic information fusion systems.

[1]  S. Challa,et al.  Bayesian and Dempster-Shafer fusion , 2004 .

[2]  Philippe Smets,et al.  Decision making in the TBM: the necessity of the pignistic transformation , 2005, Int. J. Approx. Reason..

[3]  Ronald P. S. Mahler,et al.  Combining ambiguous evidence with respect to ambiguous a priori knowledge. Part II: Fuzzy logic , 1995, Fuzzy Sets Syst..

[4]  Philip A. Bernstein,et al.  Middleware: a model for distributed system services , 1996, CACM.

[5]  Douglas C. Schmidt,et al.  Middleware for Distributed Systems Evolving the Common Structure for Network-centric Applications , 2001 .

[6]  Qusay H. Mahmoud Middleware for Communications: Mahmoud/Middleware for Communications , 2005 .

[7]  Anna Hać,et al.  Wireless Sensor Network Designs , 2003 .

[8]  R. Mahler Random Sets : Unification and Computation for Information Fusion — A Retrospective Assessment , 2004 .

[9]  Ness B. Shroff,et al.  Opportunistic transmission scheduling with resource-sharing constraints in wireless networks , 2001, IEEE J. Sel. Areas Commun..

[10]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[11]  Andrew T. Campbell,et al.  Managing complexity: middleware explained , 1999 .

[12]  Vlado Handziski,et al.  Service Discovery in Wireless Sensor Networks , 2004 .

[13]  Ronald P. S. Mahler Combining ambiguous evidence with respect to ambiguous a priori knowledge. I. Boolean logic , 1996, IEEE Trans. Syst. Man Cybern. Part A.

[14]  Upkar Varshney,et al.  Issues in Emerging 4G Wireless Networks , 2001, Computer.

[15]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[16]  Ronald P. S. Mahler,et al.  The modified Dempster-Shafer approach to classification , 1997, IEEE Trans. Syst. Man Cybern. Part A.

[17]  Thomas A. Corbi,et al.  The dawning of the autonomic computing era , 2003, IBM Syst. J..

[18]  Mark R. Morelande,et al.  Fusion of disparate identity estimates for shared situation awareness in a network-centric environment , 2006, Inf. Fusion.

[19]  K. Geihs,et al.  Middleware Challenges Ahead , 2001, Computer.

[20]  Philippe Smets,et al.  Constructing the Pignistic Probability Function in a Context of Uncertainty , 1989, UAI.

[21]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[22]  Kang Lee IEEE 1451: A standard in support of smart transducer networking , 2000, Proceedings of the 17th IEEE Instrumentation and Measurement Technology Conference [Cat. No. 00CH37066].

[23]  Alessandro Saffiotti,et al.  The Transferable Belief Model , 1991, ECSQARU.

[24]  Sotirios Terzis,et al.  Trust-based model for privacy control in context aware systems , 2003 .

[25]  Dennis G. Shea,et al.  Autonomic personal computing , 2003, IBM Syst. J..

[26]  B. Vo,et al.  Bayesian approaches to track existence - IPDA and random sets , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).

[27]  Roy H. Campbell,et al.  Towards Security and Privacy for Pervasive Computing , 2002, ISSS.

[28]  James Llinas,et al.  Revisiting the JDL Data Fusion Model II , 2004 .

[29]  Ronald P. S. Mahler,et al.  Representing Rules as Random Sets, I: Statistical Correlations between Rules , 1996, Inf. Sci..