Skip to main content

System Architecture and Core Technologies for Transportation Internet of Things

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 370))

Abstract

Considering the recent application and research status for Internet of things (IoT) in transportation industry, this paper proposed the concept, system architecture and technical systems of the Transportation IoT. In this paper, several key technical problems in the development of current transportation IoT were discussed, including sensing and recognition technology, network and communications technology, cloud computing and big data processing technology and so on, which aims at exploring the future development and application of the transportation IoT further.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chen HM, Cui L, Xie KB (2013) A comparative study on architectures and implementation methodologies of internet of things. J Chinese J Comput 36(1):168–188

    Article  Google Scholar 

  2. Xu LD, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inf 10(4):2233–2243

    Article  Google Scholar 

  3. Liu C, Li Y, Ji S (2012) Application of the internet of things technology in explosive dangerous goods transport. In: 2nd International conference on civil engineering, architecture and building materials, CEABM 2012. Trans Tech Publications, Yantai, China, pp 1725–1728

    Google Scholar 

  4. Wang Y, Cao K (2014) A proactive complex event processing method for large-scale transportation internet of things. J Int Distrib Sens Netw 2014:1–8

    Google Scholar 

  5. Ministry of Transport Planning Division of People’s Republic of China. In: Highway and waterway transportation information, “Twelfth Five-Year Plan”. EB/OL.2014-5-18. http://www.moc.gov.cn/zhuzhan/xiazaizhongxin/ziliaoxiazai/guihuatongji/201105/P020110516379012274071.doc

  6. Qian Z, Wang Y (2012) IoT technology and application. J Acta Electronica Sinica 5:026

    MathSciNet  Google Scholar 

  7. Tsai C, Lai C, Chiang M et al (2014) Data mining for internet of things: a survey. IEEE Commun Surv Tutor 16(1):77–97

    Article  Google Scholar 

  8. Velte T, Velte A, Elsenpeter R (2009) Cloud computing, a practical approach. M. McGraw-Hill, Inc., New York

    Google Scholar 

  9. Liu VY, Yu Z (2013) Wireless Sensor Networks for Internet of things: a systematic review and classification. Inf Technol J 12(16):3581–3585

    Article  Google Scholar 

  10. Hu Y, Sun Y, Yin B (2012) Information sensing and interaction technology in internet of things. Chin Comput 35(6):1147–1163

    Article  Google Scholar 

  11. Sharma A, Chaki R, Bhattacharya U (2011) Applications of wireless sensor network in intelligent traffic system: a review. In: 2011 3rd International conference on electronics computer technology (ICECT). IEEE, Kanyakumari, pp 53–57

    Google Scholar 

  12. Soumyasri SM, Ballal R (2013) A review: preserving privacy in wireless sensor networks. In: National conference on challenges in research and technology in the coming decades (CRT 2013). IET, Ujire, pp 1–7

    Google Scholar 

  13. Qian ZH, Wang YJ (2013) Internet of things-oriented wireless sensor networks review. J Electron Inf Technol 35(1):215–227

    Article  Google Scholar 

  14. Kai Z, Lina G (2013) A survey on the internet of things security. In: 2013 9th International conference on computational intelligence and security (CIS). IEEE, Leshan, pp 663–667

    Google Scholar 

  15. Chukwunonyerem J, Aibinu AM, Onwuka EN (2010) Review on security of wireless body area sensor network. In: 2014 11th International conference on electronics, computer and computation (ICECCO). IEEE, Abuja, pp 1–10

    Google Scholar 

  16. Zhu Q, Jiang XH, Zou FM (2013) Research on the Trunk Line’s transmission performance of multi-hop WMN Based on 802.11n .M. In: Business, economics, financial sciences, and management. Springer, Berlin, pp 631–636

    Google Scholar 

  17. Behl A, Behl K (2012) An analysis of cloud computing security issues. In: 2012 World congress on information and communication technologies (WICT). IEEE, Trivandrum, pp 109–114

    Google Scholar 

  18. Bouayad A, Blilat A, El Houda Mejhed N et al (2012) Cloud computing: security challenges. In: 2012 Colloquium in information science and technology (CIST). IEEE, Fez, pp 26–31

    Google Scholar 

  19. Xiaomin Z, Wei S, Liming L (2014) An Implementation approach to store GIS spatial data on NoSQL database. In: 2014 22nd international conference on geoinformatics (GeoInformatics). IEEE, Kaohsiung, pp 1–5

    Google Scholar 

  20. Deng W, Liu FM, Jin H et al (2013) Leveraging renewable energy in cloud computing datacenters: state of the art and future research. Chin J Comput 36(3):582–598

    Article  MathSciNet  Google Scholar 

  21. Qin XP, Wang HJ, Li FR et al (2013) New landscape of data management technologies. Ruanjian Xuebao/J Softw 24(2):175–197

    Google Scholar 

  22. Shen DR, Yu G, Wang XT et al (2013) Survey on NoSQL for management of big data. J Softw 24(8):1786–1803

    Article  Google Scholar 

  23. Jing H, Haihong E, Guan L et al (2011) Survey on NoSQL database. In: 2011 6th international conference on pervasive computing and applications (ICPCA). IEEE, Port Elizabeth, pp 363–366

    Google Scholar 

  24. Iwazume M, Iwase T, Tanaka K et al (2014) Big Data in memory: benchimarking in memory database using the distributed key-value store for machine to machine communication. In: 2014 15th IEEE/ACIS International conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNPD). IEEE, Sanya, China, pp 1–7

    Google Scholar 

  25. Xu X, Zou F, Liao L et al (2013) Experimental analysis for calculation performance of mass data based on GemFire. J. Comput Appl 33(1)

    Google Scholar 

  26. Da Silva CA, Ferreira AS, De Geus PL (2012) A methodology for management of cloud computing using security criteria. In: IEEE Latin America Conference on cloud computing and communications (LATINCLOUD), 2012. IEEE, Porto Alegre, pp 49–54

    Google Scholar 

  27. Zhou AY (2011) Location-based services: architecture and progress. Chin J Comput 34(7):1155–1171

    Article  Google Scholar 

  28. Abbas F, Hussain R, Jun S et al (2013) Privacy preserving cloud-based computing platform (PPCCP) for using location based services. In: 2013 IEEE/ACM 6th International conference on utility and cloud computing (UCC). IEEE, Dresden, pp 60–66

    Google Scholar 

  29. Hao Z, Wen YG, Yu N et al (2013) Privacy-preserving computation for location-based information survey via mobile cloud computing. In: 2013 IEEE/CIC International conference on communications in China (ICCC). IEEE, Xi’an, pp 100–105

    Google Scholar 

Download references

Acknowledgments

This work is supported financially by the university scientific research special of Fujian Province (No. JK2014033; No. 2013HZ0002-1; No. 2014H0008; No. 2014-G-83).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quan Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhu, Q., Zou, F., Deng, Y. (2015). System Architecture and Core Technologies for Transportation Internet of Things. In: Abraham, A., Jiang, X., Snášel, V., Pan, JS. (eds) Intelligent Data Analysis and Applications. Advances in Intelligent Systems and Computing, vol 370. Springer, Cham. https://doi.org/10.1007/978-3-319-21206-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21206-7_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21205-0

  • Online ISBN: 978-3-319-21206-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics