Situation Detection on the Edge

  • Nikos Papageorgiou
  • Dimitris ApostolouEmail author
  • Yiannis Verginadis
  • Andreas Tsagkaropoulos
  • Gregoris Mentzas
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)


Situation Awareness in edge computing devices is necessary for detecting issues that may hinder their computation capacity and reliability. The Situation Detection Mechanism presented in this paper uses Complex Event Processing in order to detect situations where the edge infrastructure requires an adaptation. We designed the Situation Detection Mechanism so as it is modular and can be easily deployed as a Docker container or a set of Docker containers. Moreover, we designed it to be independent of Complex Event Processing libraries and we have shown that it can operate with both the Siddhi and Drools libraries. We evaluated our work with a real-world scenario indicative of the usage of our component, and its capabilities.


Situation Awareness Complex Event Processing Edge computing 



This work is partly funded by the H2020 PrestoCloud project–Proactive Cloud Resources Management at the Edge for Efficient Real-Time Big Data Processing (732339).


  1. 1.
    Adi, A., Etzion, O.: Amit - the situation manager. VLDB J. 13(2), 177–203 (2004)CrossRefGoogle Scholar
  2. 2.
  3. 3.
    Chen, H., Finin, T., Joshi, A.: An ontology for context-aware pervasive computing environments. Knowl. Eng. Rev. 18(3), 197–207 (2004)CrossRefGoogle Scholar
  4. 4.
    Cohen, N.H., Lei, H., Castro, P., Davis II., J.S., Purakayastha, A.: Composing pervasive data using iQL. In: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, WMCSA 2002, pp. 94–104 (2002)Google Scholar
  5. 5.
    Haghighi, P.D., Krishnaswamy, S., Zaslavsky, A., Gaber, M.M.: Reasoning about context in uncertain pervasive computing environments. In: Proceedings of the 3rd European Conference on Smart Sensing and Context, EuroSSC 2008, pp. 112–125. Springer, Heidelberg (2008)Google Scholar
  6. 6.
    Endsley, M.: Designing for Situation Awareness: An Approach to User-Centered Design, 2nd edn. CRC Press, Boca Raton (2016)Google Scholar
  7. 7.
    Franke, U., Brynielsson, J.: Cyber situational awareness - a systematic review of the literature. Comput. Secur. 46, 18–31 (2014)CrossRefGoogle Scholar
  8. 8.
  9. 9.
    Gray, P.D., Salber, D.: Modelling and using sensed context information in the design of interactive applications. In: Proceedings of the 8th IFIP International Conference on Engineering for Human-Computer Interaction, EHCI 2001, pp. 317–336. Springer, London (2001)Google Scholar
  10. 10.
    Gu, T., Chen, S., Tao, X., Lu, J.: A non supervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6), 533–544 (2010)CrossRefGoogle Scholar
  11. 11.
  12. 12.
    Lei, H., Sow, D.M., John, S., Davis, I., Banavar, G., Ebling, M.R.: The design and applications of a context service. SIGMOBILE Mob. Comput. Commun. Rev. 6(4), 45–55 (2002)CrossRefGoogle Scholar
  13. 13.
    Loia, V., D’Aniello, G., Gaeta, A., Orciuoli, F.: Enforcing situation awareness with granular computing: a systematic overview and new perspectives. Granular Comput. 1(2), 127–143 (2016)CrossRefGoogle Scholar
  14. 14.
    Loke, S.W.: Incremental awareness and compositionality: a design philosophy for context-aware pervasive systems. Pervasive Mob. Comput. 6(2), 239–253 (2010)CrossRefGoogle Scholar
  15. 15.
  16. 16.
    Ranganathan, A., Al-Muhtadi, J., Campbell, R.H.: Reasoning about uncertain contexts in pervasive computing environments. IEEE Pervasive Comput. 03(2), 62–70 (2004)CrossRefGoogle Scholar
  17. 17.
    Yau, S.S., Liu, J.: Hierarchical situation modeling and reasoning for pervasive computing. In: The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, SEUS 2006/WCCIA 2006, pp. 6-pp, April 2006Google Scholar
  18. 18.
    Ye, J., Dobson, S., McKeever, S.: Situation identification techniques in pervasive computing: a review. Pervasive Mob. Comput. 8(1), 36–66 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Nikos Papageorgiou
    • 1
  • Dimitris Apostolou
    • 1
    • 2
    Email author
  • Yiannis Verginadis
    • 1
  • Andreas Tsagkaropoulos
    • 1
  • Gregoris Mentzas
    • 1
  1. 1.National Technical University of AthensZografou, AthensGreece
  2. 2.University of PiraeusPiraeusGreece

Personalised recommendations