Research Paper 8
Research Paper 8
  ABSTRACT Social distancing plays a pivotal role in preventing the spread of viral diseases illnesses such as
  COVID-19. By minimizing the close physical contact among people, we can reduce the chances of catching
  the virus and spreading it across the community. This two-part paper aims to provide a comprehensive
  survey on how emerging technologies, e.g., wireless and networking, artificial intelligence (AI) can enable,
  encourage, and even enforce social distancing practice. In this Part I, we provide a comprehensive back-
  ground of social distancing including basic concepts, measurements, models, and propose various practical
  social distancing scenarios. We then discuss enabling wireless technologies which are especially effect-
  in social distancing, e.g., symptom prediction, detection and monitoring quarantined people, and contact
  tracing. The companion paper Part II surveys other emerging and related technologies, such as machine
  learning, computer vision, thermal, ultrasound, etc., and discusses open issues and challenges (e.g., privacy-
  preserving, scheduling, and incentive mechanisms) in implementing social distancing in practice.
  INDEX TERMS Social distancing, pandemic, COVID-19, wireless, networking, positioning systems, AI,
  machine learning, data analytics, localization, privacy-preserving, scheduling, incentive mechanism.
                     This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
VOLUME 8, 2020                                                                                                                                                        153479
                           C. T. Nguyen et al.: Comprehensive Survey of Enabling and Emerging Technologies—Part I: Fundamentals and Enabling Technologies
25% unemployment rate in the U.S. [4], one million people                      ensure that the number of patients does not exceed the public
lost their jobs in Canada during March 2020 [5], 1.4 million                   healthcare capacity. Moreover, social distancing also delays
jobs lost in Australia [6], and a projected global 3% GDP                      the outbreak peak [32] so that there is more time to implement
loss [7]), resulting in a global recession as predicted by many                countermeasures. Furthermore, social distancing can reduce
experts [7]–[9]. In such context, there is an urgent need for                  the final number of infected cases [32], and the earlier social
solutions to contain the disease spread, thereby reducing its                  distancing is implemented, the stronger the effects will be as
negative impacts and buying more time for pharmaceutical                       illustrated in Fig. 1(b) [12].
solution development.                                                              During the ongoing COVID-19 pandemic, many govern-
   In the presence of contagious diseases such as SARS,                        ments have implemented various social distancing measures
H1N1, and COVID-19, social distancing is an effective                          such as travel restrictions, border control, closing public
non-pharmaceutical approach to limit the disease transmis-                     places, and warning their citizens to keep a 1.5–2 meters dis-
sion [10], [25], [32]. Social distancing refers to measures                    tance from each other when they have to go outside [13]–[15].
that minimize the disease spread by reducing the frequency                     Nevertheless, such aggressive and large-scale measures are
and closeness of human physical contacts, such as closing                      not easy to implement, e.g., not all public spaces can be
public places (e.g., schools and workplaces), avoiding mass                    closed, and people still have to go outside for food, health-
gatherings, and keeping a sufficient distance amongst peo-                     care, or essential work. In such context, technologies play
ple [10], [16]. By reducing the probability that the disease                   a key role in facilitating social distancing measures. For
can be transmitted from an infected person to a healthy one,                   example, wireless positioning systems can effectively help
social distancing can significantly reduce the disease’s spread                people to keep a safe distance by measuring the distances
and severity. If implemented properly at the early stages of                   among people and alerting them when they are too close to
a pandemic, social distancing measures can play a key role                     each other. Moreover, other technologies such as Artificial
in reducing the infection rate and delay the disease’s peak,                   Intelligence (AI) technologies can be used to facilitate or even
thereby reducing the burden on the healthcare systems and                      enforce social distancing.
lowering death rates [10], [25], [32]. Fig. 1 illustrates the                      In this two-part paper, we present a comprehensive survey
effects of social distancing measures on the daily number of                   on enabling and emerging technologies for social distancing.
cases [12]. As can be observed in Fig. 1(a), social distanc-                   The main aims are to provide a comprehensive background
ing can reduce the peak number of infected cases [32] to                       on social distancing as well as effective technologies that can
                                                                               be used to facilitate the social distancing practice. In Part I,
                                                                               we first present basic concepts of social distancing together
                                                                               with its measurements, models, effectiveness, and practical
                                                                               scenarios. After that, we review enabling wireless technolo-
                                                                               gies which are especially effective in monitoring and keeping
                                                                               distance amongst people. In Part II [1], we survey other
                                                                               emerging technologies, e.g., AI, thermal, computer vision,
                                                                               ultrasound, and visible light, and discuss open issues and
                                                                               challenges (e.g., privacy-preserving, scheduling, and incen-
                                                                               tive mechanisms) of implementing technologies for social
                                                                               distancing.
                                                                                   There are several surveys of enabling technologies for
                                                                               the current COVID-19 pandemic, such as [18], [19], with
                                                                               different focuses. Particularly, [18] surveys the application of
                                                                               AI technologies and data-sharing methods for urban health
                                                                               monitoring, and [19] focuses on emerging technologies such
                                                                               as AI, 3D printing, blockchain, etc., and their applications
                                                                               for social distancing. Different from these surveys, our paper
                                                                               focuses on both the newly emerged technologies and the
                                                                               readily available wireless technologies such as Wi-Fi, Blue-
                                                                               tooth, Cellular, etc. Moreover, although there are few sur-
                                                                               veys related to localization and positioning systems using
                                                                               those wireless technologies, e.g., [20]–[23], to the best of our
                                                                               knowledge, this is the first survey in the literature discussing
                                                                               the applications of those technologies for social distancing.
                                                                               It is worth noting that, due to the increasingly complex devel-
FIGURE 1. The effects of social distancing on an infected disease              opment of many types of viruses as well as the rapid growth of
outbreak. (a) Social distancing can delay and reduce the outbreak peak.
(b) Social distancing can reduce the total number of cases. The earlier        social interaction and globalization, the concept of social dis-
social distancing is applied, the stronger its effect will be [12].            tancing is not as simple as physical distancing. In fact, it also
model, except that the recovered individuals can be infected                measures at workplaces is evaluated by an agent-based simu-
again, and thus the MSEIRS is only used for the cases where                 lation approach. In particular, six different workplace strate-
immunity is not permanent. Among these models, the classic                  gies that reduce the number of workdays are simulated.
SIR model is the most common. Let S(t) be the number of                     The results show that, for seasonal influenza (Ro = 1.4),
susceptible, I (t) be the number of infected, and R(t) be the               reducing the number of workdays can effectively reduce the
number of recovered individuals in a population at time t.                  final attack rate (e.g., up to 82% if three consecutive work-
Moreover, let β be the average number of adequate contacts                  days are reduced). Nevertheless, in pandemic-level influenza
(i.e., contacts that infect a new case) and γ1 be the average               (Ro = 2.0), reducing the number of workdays has a signif-
infectious period. Then, the SIR model is defined by                        icantly weaker impact, i.e., 3% (one extra day off) to 21%
                        dS       −βIS                                       decrease (three extra consecutive days off). Several other
                             =         ,                                    studies present similar results. In [28], it is shown that work-
                        dt         N
                        dI       βIS     γI                                 place social distancing can reduce the final attack rate by up
                             =        −     ,                               to 39% in a Ro = 1.4 setting. Similarly, [29] shows that
                        dt        N      N
                        dR       γI                                         different types of measures can reduce the attack rate from
                             =      ,                          (2)          11% to 20% depending on the frequency of contacts among
                        dt       N
                                                                            the employees.
where N is the total population. In (2), since β is the num-                   For school closure measures, studies also show positive
ber of adequate contacts an infected case made and S is                     effects. In [30], a modeling technique is employed to examine
the number of infected cases, βIS     N is the rate at which new            the effects of four different social distancing measures under
susceptible individuals are infected. Moreover, the recovery                three varying Ro settings. Among different types of measures,
rate is inversely proportional to the infectious period γ1 , and            the school closure measure is shown to be able to reduce the
the total infection rate is the infectious rate minus the recovery          final attack rate by 20%, 10%, and 5%, and the peak attack
rate. It is also worth noting that since β is the number of                 rate by 77%, 47%, and 32% in the cases where Ro < 1.9,
adequate contacts per unit time and γ1 is the infection time,               2.0 ≤ R0 ≤ 2.4, and Ro > 2.5, respectively. Similarly, it is
β
γ is the total number of newly infected cases caused by a                   shown in [31] that prolonged school closure in a pandemic
typical infected individual. This is what Ro represents, and                context can reduce the final attack rate by up to 17% and the
thus γβ = Ro .                                                              peak attack rate by up to 45%.
   The abovementioned SIR models neglect several important                     Another common social distancing measure is the isola-
aspects of a disease such as people with passive immunity and               tion of confirmed cases and cases with similar symptoms.
vital dynamics (birth and deaths). Consequently, the model                  In [32], large-scale epidemic simulations are performed to
is only effective for modeling a novel strain of an infectious              evaluate different strategies for influenza pandemic mitiga-
disease (so there is no passive immunity) over a short period               tion. Among the simulated strategies, the results show that
of time (birth and death can be neglected). On the other hand,              the proper implementation (such that an isolated individual
the simplicity of the model ensures that it is well-posed. As a             reduces 90% of its contact rate) of isolation can reduce the
result, the classic SIR model is used in many simulations to                final attack rate by 7% in a Ro = 2 setting. Similarly, it is
predict the infection rate of many infectious diseases.                     shown in [30] that isolation can reduce the final attack rate
                                                                            by 27%, 7%, and 5%, and the peak attack rate by 89%, 72%,
3) EFFECTIVENESS                                                            and 53% in the cases where Ro < 1.9, 2.0 ≤ R0 ≤ 2.4, and
To evaluate the effectiveness of social distancing, a common                Ro > 2.5, respectively.
approach is to measure the attack rate which is the percentage                 For household quarantines, studies have shown that this
of infected people in a susceptible population (where no one                measure can be effective if the compliance level is sufficient.
is immune at the beginning of the disease) at the time of                   In [32], the effects of voluntary quarantine of household for
measurement [27]. The attack rate reflects the severity of a                a duration of 14 days are examined. Simulations are carried
disease at a given time, and thus it has different values during            out with the assumption that 50% of households will comply,
the disease outbreak. Among these values, the peak attack rate              which leads to a 75% reduction of external contact rates,
is often considered and compared to the current healthcare                  while the internal contact rate will increase by 100%. The
capacity (e.g., intensive care unit capacity) to see the current            results show that this measure can reduce the final attack rate
system’s ability to handle the peak number of patients. After               by up to 6% and the peak attack rate by up to 40%. Similarly,
the outbreak is over, data is often collected to determine the              in [33], simulations are performed to examine the impacts
final attack rate which is the total number of infected cases               of different measures. For household quarantines, the result
over the entire course of the outbreak divided by the total                 shows that this measure can reduce the final attack rate by
population.                                                                 31% and the peak attack rate by 68% with Ro = 1.8 and a
   Social distancing measures are proven to be effective when               compliance rate of 50%.
implemented properly [27]–[33]. Different types of social                      Apart from the abovementioned measures, the effective-
distancing measures may have diverse levels of effectiveness                ness of the other social distancing measures either received
on the disease spread. In [27], the effect of social distancing             limited attention or was often considered in combination with
another approach. In [32], the effectiveness of travel restric-                 Control and Prevention (CDC), U. S. Food and Drug Admin-
tions and border control measures are examined. However,                        istration (FDA), Australian Department of Health, and Pub-
the results only show that different levels of travel restrictions              lic Health England have announced various protocols and
(from 90% to 99.9%) can delay the peak attack rate by up                        guidelines [13]–[17] during the current COVID-19 pandemic.
to six weeks, while how travel restrictions affect the attack                   Although they are proposed by different organizations, these
rate is not examined. Another type of measure that does                         guidelines and protocols share the same objective to limit
not receive much attention is community contact reduction                       the spread of the virus and many similar methods such as
measures (e.g., avoiding crowds and mass gatherings can-                        keeping physical distance, avoiding mass gatherings, reduc-
cellation). In [30], it is shown that this type of measure can                  ing unnecessary physical contact, practicing good hygiene,
reduce the final attack rate by 17%, 14%, and 10%, and the                      etc. Generally, these protocols and guidelines vary with the
peak attack rate by 72%, 49%, and 38% in the cases where                        severity of the pandemic at each particular location, e.g.,
Ro < 1.9, 2.0 ≤ Ro ≤ 2.4, and Ro > 2.5, respectively.                           stricter and more detailed protocols are proposed for the
   When combined together, social distancing measures are                       places where the pandemic is more severe.
proven to be even more effective [30], [32], [34]. It is shown
in [30] that when all four measures, i.e., school closure,                      b: EFFECTIVENESS
isolation, workplace nonattendance, and community contact                       In the current COVID-19 pandemic, The World Health Orga-
reduction, are in effect, they can drastically reduce the attack                nization (WHO) estimates that the value of Ro would be in
rates in all the considered Ro settings. In particular, the final               the range of 2-2.5 [46]. As can be seen from the abovemen-
attack rate can decrease from 65% to only 3% and the peak                       tioned studies, social distancing measures can play a vital
attack rate from 474 cases per 10 thousand to only five                         role in mitigating this pandemic with such Ro values. For
cases, in the highest Ro setting. Similarly, [32] examines                      example, Fig. 3 illustrates the rolling 3-day average of daily
the effects when household quarantines, workplace closures,                     new confirmed COVID-19 cases in several countries [37].
border control, and travel restrictions are combined. The                       Generally, after a country began implementing social dis-
results show that the final and peak attack rates are three                     tancing (e.g., lockdown at different levels) for 13-23 days,
times and six times, respectively, lower than when no policy is                 the daily number of new cases begins to drop. As can also be
implemented. Moreover, the peak attack rate can be delayed
by nearly three months in a Ro = 1.7 setting. In [34], it is also
shown that when four types of measures (i.e., school closure,
household quarantines, workplace nonattendance, and com-
munity contact reduction) are in effect, the final attack rate
can be reduced 3-4 times depending on Ro .
   There are several studies focusing on the negative impacts
of social distancing. In [35], simulations are performed based
on a standard SIR model to evaluate the benefit and cost of
different social distancing strategies. In this study, simula-
tions are carried out without and with social distancing under
different caution levels settings. Simulation results are evalu-
ated based on the benefits of the reduced infection rate and the
economic cost of reducing contacts. The main finding of this
work is that a favorable result can only be obtained by imple-
menting social distancing measures with a high caution level.
Since the economic cost is also considered, it is shown that
implementing social distancing with an insufficient caution
level gives worse results than that of the case without social
distancing. In [36], a game theoretical approach based on the
classic SIR model is proposed to evaluate the benefits and
costs of social distancing measures. Interestingly, the results
show that in the case where Ro < 1, the equilibrium behaviors
include no social distancing measures. Moreover, social dis-
tancing measures are shown to achieve the highest economic
benefit when Ro ≈ 2.
4) SOCIAL DISTANCING IN COVID-19                                                FIGURE 3. The effects of social distancing in the current
a: PROTOCOLS AND GUIDELINES                                                     COVID-19 pandemic. (a) In several countries, the daily number of cases
                                                                                started to reduce approximately 2–3 weeks after the implementation of
Organizations such as European Centre for Disease                               social distancing [37]. (b) The impact of social distancing on the total
Prevention and Control (ECDC), U. S. Centers for Disease                        number of cases (flattening the curve) [38].
seen from the second graph, the curves representing the total                      not always easy to do so. For example, it is hard to
number of cases become less steep after social distancing is                       always keep a safe distance between people (estimating
implemented (i.e., flattening the curve).                                          and maintaining a 1.5–2 m distance all the time is not
   Modeling and simulation approaches also predict positive                        easy), people still have to go outside for healthcare or
effects of social distancing on the current pandemic. It is                        food, and it is not always possible to work from home
shown in [40] that different combinations of several social                        (essential workers).
distancing measures, including public place closure, self-                     •   Difficulties when many people stay at home: With the
isolation, household quarantine, and isolation of elderly peo-                     closure of schools and workplaces, many people will
ple, have different effects on the number of cases in ICU.                         have to work or study remotely, which leads to an over-
Among them, the combination of all four measures achieves                          whelming increase in Internet traffic and online service
the best effects, i.e., the peak number of cases is nearly                         demands, e.g., newly registered users of Zoom [91] and
4 times lower and the peak is delayed for three months com-                        Microsoft Teams [92] have increased 1270% and 775%,
pared to those of the no social distancing scenario. Moreover,                     respectively, since the lockdown begins.
the model also predicts that a second wave will occur in the
United Kingdom if social distancing measures are lifted.                    d: SECOND WAVES
   Similarly, a prediction modeling approach based on the                   These challenges often lead to the premature termination of
SEIR model is presented in [41], which shows the effects                    social distancing measures by the authorities (e.g., lifting
of different social distancing strategies, including no social              restriction) or people (e.g., do not comply with social distanc-
distancing, intermittent and continuous social distancing                   ing or resuming normal behaviors too soon) [11]. However,
implementation in 16 countries. The simulation predicts                     such improper implementation of social distancing may lead
that continuous implementation of social distancing achieves                to dire consequences such as a second wave of the pandemic
the lowest mortality rates in all countries, although the                   (i.e., the attack rate rises sharply again).
authors suggest that such strategies are not sustainable for                   As an example, in the previous 1918 influenza pandemic
low-income countries.                                                       (the Spanish flu), social distancing measures, after their initial
   In [42], the authors develop a neural network to study                   success in the first wave, were reduced or ended prema-
and predict the effects of strict social distancing measures                turely by the authorities. Moreover, once the first wave was
(e.g., quarantine) on the pandemic mitigation in four different             over, the perceived risk reduced, and people resumed normal
regions, namely Wuhan, Italy, South Korea, and the United                   behaviors although there had not been an effective pharma-
States. Particularly, the proposed neural network is used to                ceutical solution yet. These are the main reasons that lead to
determine the parameters of the SIR and SEIR model, such                    the second wave [43], [44]. This second wave can be even
as β and γ in (2). The results show that a stricter social                  worse than the first wave, as evidenced by the 1918 pandemic
distancing strategy has a stronger impact on reducing Ro ,                  data collected at various geographical locations. For example,
thereby reducing the pandemic severity.                                     in Sydney, the second wave of the Spanish flu pandemic had a
                                                                            slightly higher attack rate but nearly double the mortality rate
c: CHALLENGES                                                               compared to those of the first wave [43]. Another example
Despite its significant potential, it can be observed that social           is presented in [44], where the mortality data of 16 United
distancing is very effective only when applied properly. Nev-               States cities were collected during the 1918 influenza pan-
ertheless, it is not easy to implement because of many chal-                demic. Among the cities, second waves occurred in 8 cities.
lenges such as:                                                             Compared to the first waves, the second waves in these cities
   • Negative economic impacts: Many social distancing                      caused higher death rates in 4 cities and lower death rates in
     measures, especially travel restriction, border control,               the others.
     and public places closure have negative impacts on the                    In the current COVID-19 pandemic, several countries,
     economy. This may lead to premature lifting of restric-                e.g., Iran, South Korea, the United States, and Singapore,
     tions by the authorities, e.g., Iran, South Korea, China,              have suffered from a second wave as illustrated in Fig. 4.
     Germany lifted restrictions too early and had to reimpose              As observed in Fig. 4(a), when the number of new cases
     restrictions [39], [71].                                               began decreasing, the authorities of Iran started to lift and
   • Personal rights violation: Restriction measures such as                reduce several social distancing measures (e.g., the grad-
     quarantines, canceling mass gatherings, and isolation                  ual reopening of government offices, shopping malls, etc.),
     may conflict with ethical and religious principles, e.g.,              which led to the second wave after three weeks. Similarly,
     Iran closed religious facilities during lockdown [45].                 South Korea and the United States lifted restrictions in early
     Moreover, contact tracing and tracking the movement of                 May (e.g., partially reopen bars, restaurants, schools, etc.),
     infected people, e.g., contact tracing in Singapore [105],             and a second wave occurred in both countries shortly after,
     also violate people’s privacy. Consequently, people                    as shown in Fig. 4(b) and Fig. 4(c), respectively. In the
     might not comply with these measures.                                  case of Singapore, the authorities did not lift the restric-
   • Difficulties in changing people’s behavior: Even when                  tions prematurely. However, only a partial lockdown was
     a person wants to comply with social distancing, it is                 implemented, e.g., schools and businesses were not closed
FIGURE 4. Second waves of COVID-19 in (a) Iran [38], (b) South Korea [38], (c) United States [38], and (d) Singapore [38]. In these countries,
the government started easing restrictions too soon, which results in a second wave.
at the beginning. Since social distancing measures were not                     limited to certain circumstances, and hard to implement on
strictly enforced, its effectiveness relies on people’s per-                    a large scale. Moreover, technologies can be used in con-
ceived risk which decreased as the number of daily new                          junction with these methods, e.g., uses technologies to detect
cases decreased. Consequently, the second wave occurred as                      crowds and inform law enforcement. Therefore, technologies
shown in Fig. 4(d). We can observe from the figures that the                    can play a vital role in facilitating social distancing.
pandemic’s severity in the second wave can be much more
devastating than that in the first wave, e.g., in the United                    e: PRACTICAL SCENARIOS
States and Singapore. Consequently, the authorities have to                     The practical social distancing scenarios identified/proposed
impose restrictions again, e.g., Iran, South Korea, China,                      in this survey are categorized and illustrated in Fig. 5. More
Germany, etc. [39], [71].                                                       specific scenarios are summarized in Table 1. The scenarios
   Until effective pharmaceutical solutions (e.g., vaccines) are                can be briefly classified as follows:
successfully developed and widely available, social distanc-                       • Keeping distance: In these scenarios, various positioning
ing remains the best type of measures available to mitigate                           and AI technologies can assist in keeping sufficient
the pandemic [11]. Therefore, social distancing still plays                           distance (e.g., 1.5m apart) between people. Based on
a vital role in pandemic mitigation, for both the current                             that, when a person gets too close to another or a crowd,
COVID-19 and future pandemics. In that context, technolo-                             the person can be alerted (e.g., by smartphones).
gies can be leveraged to reduce social distancing negative                         • Real-time monitoring: Many wireless and related tech-
effects and ensure social distancing proper implementation.                           nologies can be utilized to monitor people and public
Besides technologies, other methods such as creating phys-                            places in real-time (without compromising citizens’ pri-
ical obstacles between people (e.g., plastic dividers, plastic                        vacy). The purposes of such monitoring are to gather
shields, etc. [227]), markings on pavements and roads [228],                          meaningful data (e.g., numbers of people inside build-
social distancing awareness signs [228], and law enforcement                          ings, contacts, symptoms, crowds, and social distanc-
involvement [228] have been applied to facilitate social dis-                         ing measures violations) to facilitate social distancing.
tancing. However, these methods are not always available,                             Based on these data, appropriate measures can be carried
  FIGURE 5. Illustrations of the practical social distancing scenarios identified/proposed in this survey. These scenarios can be categorized into seven
  main groups: keeping distance, real-time monitoring, information system, incentive, scheduling, AI, and automation.
      out (e.g., limit access to buildings when there are too                       (RFID), and Zigbee can be applied for building access
      many people inside, avoid crowds, and alert/penalize                          scheduling.
      violations).                                                                • Automation: In the social distancing context,
  •   Information system: Technologies such as Bluetooth,                           autonomous vehicles such as medical robots and
      Ultra-wideband, Global Navigation Satellite Systems                           unmanned aerial vehicle (UAV) can be utilized to reduce
      (GNSS), and thermal sensors can be employed to collect                        the need for human presence in essential tasks, e.g., med-
      the trajectory data of the infected individuals and the                       ical procedures and delivery services. Technologies such
      contacts that these individuals made. Based on this infor-                    as ultra-wideband, GPS, ultrasound, and inertial sensors
      mation, susceptible people who were at the same place                         can be leveraged for the positioning and navigation of
      or had contacts with the infected ones can take cautious                      these autonomous vehicles.
      actions (e.g., self-isolation, and test for the disease).                   • Modeling and Prediction: AI technologies can be
  •   Incentive: Social distancing has negative impacts on                          employed for pandemic data mining. The results can
      personal freedom and the economy. Therefore, incentive                        help to predict the future trends and movement of
      mechanisms are needed to encourage people to comply                           the infected and susceptible individuals. Moreover,
      with social distancing measures (e.g., incentivize people                     AI-based classification algorithms can be leveraged to
      to share their movement data and self-isolate). Opti-                         detect disease symptoms in public places.
      mization techniques and technologies such as Bluetooth,                   The applications of technologies to specific social distancing
      Wi-Fi, and cellular together with economics tools like                    scenarios are illustrated in Fig. 6.
      game theory, auctioning, and contract theory can facili-
      tate those incentive mechanisms.                                          B. POSITIONING TECHNOLOGIES
  •   Scheduling: Various scheduling techniques can be                          Since the main principle of social distancing is to increase
      employed to increase the efficiency of workforce and                      the distances of human contacts, approaches to determine
      home healthcare service scheduling, thereby decreasing                    the positions and measure the distance between people can
      the number of employees at workplaces and patients at                     play a vital role in facilitating social distancing measures.
      hospitals. Moreover, scheduling techniques can also be                    Using ubiquitous technologies, such as Wi-Fi, cellular, and
      applied for traffic control to reduce the number of vehi-                 GNSS, positioning (localization) systems are crucial to many
      cles and pedestrians on the street. Furthermore, tech-                    practical social distancing scenarios such as distance keeping,
      nologies such as Wi-Fi, Radio frequency identification                    public places monitoring, contact tracing, and automation.
1) OVERVIEW OF POSITIONING SYSTEMS                                              a positioning system aims to continuously track the position
Fig. 7 illustrates the general process and several pop-                         of an object in real-time [23]. To achieve this goal, firstly,
ular methods of a positioning system [47]. Generally,                           signals are transmitted from the target to the receiving nodes
         FIGURE 6. Application of technologies to different social distancing scenarios. Some technologies, e.g., Cellular and GNSS, can be applied
         to many scenarios, whereas technologies such as Zigbee and RFID are applicable to fewer scenarios due to their limited communication
         ranges. Scenarios from the same group have the same color. The arrows that show the links from one technology to different scenarios
         have the same color.
FIGURE 7. General principle of positioning systems. Signals from sensors are measured using different methods, e.g., time-based, AOA, and RSS, to derive
the corresponding signal properties such as traveling times and angles. Based on these measurements, the position of the object can be determined by
position calculation techniques such as trilateration, triangulation, and MLE.
(e.g., sensors). From the received signals, useful properties                    determine the distance between the receiving nodes and the
such as arrival time, signal direction, and signal strength                      target [47]. Time-based methods can be further classified as
(depending on the measurement methods) are extracted in the                      follows:
signal measurement phase. Based on these features, the posi-                        • Time-of-Arrival (TOA) [50]: This method determines
tion of the target can be calculated using various methods                            the distance D between the receiving node and the target
in the position calculation phase [47]. Several effective sig-                        based on the time it takes for the signal to travel from
nal measurements and position calculation methods are pre-                            the target to the node, i.e.,
sented in the rest of this section.
                                                                                                                   D = ct,                             (3)
2) SIGNAL MEASUREMENTS                                                                  where c is the speed of the signal transmission and t is
Typical signal measurement methods can be classified based                              the time for the signal to reach the receiving node.
on the extracted property of the received signal. Among them,                       •   Time Difference-of-Arrival (TDOA) [50]: This method
time-based methods use the arrival time of the signal to                                uses two kinds of signal with different speeds and
      calculates D based on the difference between them, i.e.,                  reference nodes and the corresponding measured distances
                            D      D                                            D1 , D2 , and D3 , the coordinate (x, y) of the target can be
                               −      = t1 − t2 ,                (4)            determined by
                            c1    c2
                                                                                             p
                                                                                             p(x1 − x) + (y1 − y) = D1 ,
      where c1 , c2 , t1 , and t2 are the speeds and arrival time of                                    2           2
      the two signals, respectively.
                                                                                                (x2 − x)2 + (y2 − y)2 = D2 ,              (7)
   • Round Trip Time (RTT) [47]: The RTT method measures                                     p
                                                                                                (x3 − x) + (y3 − y) = D3 .
                                                                                             
                                                                                                         2           2
      the duration in which the signal travels to the targets and
      comes back, i.e.,                                                            Instead of using distances, the Triangulation method uses
                                    tRT − 1t                                    the angles of the signal (from the AOA method) to deter-
                             D=              ,                   (5)
                                        2                                       mine the target’s position. As illustrated in Fig. 7, if the
      where tRT is the time of the whole round trip, and 1t                     coordinates of two reference nodes and the corresponding
      is the predetermined delay between when the target                        measured angles α1 , α2 are known, the target’s position can
      receives the signal and when the target starts sending                    be geometrically determined [47].
      back.                                                                        To address the uncertainty in measurements, the Maximum
A common disadvantage of the TOA and TDOA methods                               Likelihood Estimation (MLE) method is often employed.
is that they require synchronized clocks at the node and the                    This method utilizes the signal measurements from a num-
target to determine t, t1 and t2 . That may be costly to be                     ber of reference nodes (usually three or more) and applies
implemented as it requires frequent calibrations to maintain                    some statistical approaches such as the minimum variance
accuracy. Although the RTT method does not require clock                        estimation method [49] to calculate the target’s position while
synchronization, it needs to acquire the delay 1t which can-                    minimizing the impact of noises in the environment [47].
not be predicted in many circumstances [48]. Consequently,
extra efforts are needed to determine 1t.                                       III. WIRELESS TECHNOLOGIES FOR SOCIAL DISTANCING
   Unlike the time-based methods, the Angle-of-Arrival                          To enable social distancing, many wireless technologies
(AOA) method determines D by measuring the angle of                             can be adopted such as Wi-Fi, Cellular, Bluetooth, Ultra-
the incoming signals by using directional antennas or array                     wideband, GNSS, Zigbee, and RFID. In this section, we first
of antennas. The measured angles can then be used in the                        briefly provide the fundamentals of these technologies and
triangulation method to geometrically determine the target                      then explain how they can enable, encourage, and enforce
position. However, the main disadvantage of this method is                      people to practice social distancing. After that, we discuss the
that it requires extra directional antennas which are costly to                 potential applications, advantages, limitations, and feasibility
implement [47].                                                                 of these technologies.
   The Received Signal Strength Indication (RSSI) method
measures the attenuation of the signals to determine the                        A. Wi-Fi
distance. Typically, the relationship between the RSSI and                      Due to the fact that Wi-Fi technology is widely deployed
distance can be formulated as follows [53]:                                     in indoor environments, this technology can be considered
                                                                                a promising solution to practice social distancing inside
                  PR = α − 10n log10 (d) + X ,                        (6)       multi-story buildings, airports, alleys, parking garages, and
where PR is the RSSI value at the receiver (e.g., access point),                underground locations where GPS and other satellite tech-
d represents the distance from the user device to the access                    nologies may not be available or provide low accuracy [20].
point, X is a random variable (caused by the shadowing                          In a Wi-Fi system, a wireless transmitter, known as a wireless
effect) which follows the Gaussian distribution with zero                       access point (AP), is required to transmit radio signals to
mean. α is a constant value which can be known in advance                       communicate with user devices in its coverage area. Cur-
and depends on fading, antennas gain, and emitted power of                      rently, Wi-Fi enabled wireless devices are working according
the user device. n is the path loss exponent which depends on                   to the IEEE 802.11 standards. Wi-Fi 6 (based on 802.11ax
the channel environment between each user device and the                        technology) is the latest version of the Wi-Fi standards which
access point. Thus, based on the RSSI level of the received                     provides high-throughput and reliable communications [51].
signals, the access point can estimate the position of the user                 We discuss a few example scenarios of social distancing that
device in indoor environments.                                                  can be enabled by Wi-Fi as follows.
There are two main reasons making Wi-Fi technology pos-                        To address these problems, several solutions [55]–[59]
sible in social distancing. First, due to the convenience of                are proposed to enable indoor localization in dynamic and
hardware facilities, we can quickly deploy Wi-Fi systems for                complicated areas such as airports and train stations. With
user positioning with very low cost and efforts [52]. Sec-                  these solutions, the authorities can detect crowds and force
ond, with recent advances in Wi-Fi-based indoor positioning,                people to leave to enable social distancing during pandemic
Wi-Fi can provide reliable and precise location services to                 outbreaks. Specifically, in [55], the authors show that when
enable social distancing. The most common and easiest way                   the environment changes, e.g., the presence of people in the
for indoor positioning is to calculate the user’s location based            line of sight between the user device and the access point,
on the RSSI of the received signals from the user device [53],              the performance of conventional RSSI-based localization
[54]. However, the accuracy of this solution much depends                   techniques is greatly decreased. Thus, the authors propose
on the propagation model. Thus, in [53], the authors present                an adaptive signal model fingerprinting algorithm to adapt to
a new method to dynamically estimate the channel model                      the dynamic of the environment by detecting users’ positions
from the user device to the access point. The key idea of                   and updating the database simultaneously. In [59], the authors
this solution is continuously determining the RSSI values in                propose a new localization technique to locate multiple users
real-time to obtain the estimated channel model that is close               in different areas by performing a fine-grained localization.
to the real channel model. Once the propagation is estimated,               In addition, the authors introduce a transfer mechanism to
the distance between the access point and the user device can               adjust the fingerprint database over multiple areas to mini-
be accurately determined. After that, the user’s location will              mize human intervention.
be derived by using the trilateration mechanism.                               An interesting design is proposed in [60] to locate and track
   Differently, the authors in [54] propose to adopt the inertial           people by using Wi-Fi technology, namely Wi-Vi (stands for
navigation system (INS) to significantly increase the accu-                 Wi-Fi Vision). This technology allows the authorities to track
racy of conventional RSSI-based methods. The key idea of                    people in indoor environments and detect potential crowds,
this solution is using a Kalman filter to combine and fill                  so that they can take appropriate actions to enable social dis-
the signal database with the INS data. As such, the authors                 tancing, e.g., inform people not to go to potentially crowded
can obtain the average distance error as small as 0.6 m. The                places. In particular, Wi-Vi uses a MIMO interference nulling
above RSSI-based solutions can be easily adopted to detect                  to remove reflections from static objects and only focuses on
crowds in indoor environments. Then, the local authorities                  moving objects, e.g., a user. Moreover, the authors propose
can take appropriate actions to disperse the crowds or suggest              to consider the movement of a user as an antenna array and
other people not to go to the place. For example, if there                  then track the user by observing its RF beams. If there are
are too many people in a supermarket, the authorities can                   many people having the same direction, e.g., going to the
notify and recommend new coming customers to go to other                    same place, the authorities can notify them to avoid forming
supermarkets or come in another time so that they can avoid                 crowds. Thus, Wi-Vi can be considered a promising technol-
crowds.                                                                     ogy to enable social distancing.
                                                                               However, to efficiently detect crowds, Wi-Fi-based local-
2) CROWD DETECTION IN DYNAMIC ENVIRONMENTS                                  ization systems may require several transceivers attached to
Although the RSSI-based solution can detect the user’s loca-                each access point to obtain high accuracy. Another problem
tion with sufficient accuracy, it may not be effective in                   is to differentiate between human and machine terminals.
dynamic and complicated indoor environments such as air-                    To address this problem, fingerprint databases can be used to
ports or train stations [55]–[57]. This is due to the effects of            detect machine terminals which are usually placed at known
non-line of sight (NLOS) propagation on the wireless signals                locations. Nevertheless, this solution may not be feasible if
between the user’s device and the access point, especially in               we consider autonomous robots in the environments, and thus
dynamic and complicated environments in which the wireless                  can be a potential research direction.
signals are greatly scattered by obstacle shadows or peo-
ple (e.g., running and walking) [55]. Another RSSI-based                    3) PUBLIC PLACE MONITORING AND ACCESS SCHEDULING
indoor localization technique is the fingerprinting approach                Another way to apply Wi-Fi technology in social distancing
(or radio map) that locates devices based on a previously                   is by controlling the number of people inside a building, e.g.,
built database. In particular, this database contains the sig-              supermarket, shopping mall, and university. Specifically, with
nal fingerprints corresponding to several access points in                  various Wi-Fi access points implemented inside the building,
a specific area. Nevertheless, collecting fingerprint data is               the number of people currently inside the building can be
time-consuming and laborious [58], especially in large areas                estimated based on the number of connections from user
such as airports or train stations. In addition, it is infeasi-             devices to the access points. For example, the authors in [61]
ble to directly apply the pre-obtained fingerprint database                 propose a low-cost cyber physical social sensing system
to new areas for localization [59]. The main reason is that                 which tracks the Wi-Fi messages between the devices, e.g.
the adjustment process to apply the fingerprint database of                 smartphones, and the access points. Based on these messages,
an area to another is time-consuming and usually requires                   meaningful information such as the number of people within
human intervention.                                                         the coverage area of the access points can be extracted. Using
                      FIGURE 8. Cellular technology can support different social distancing scenarios. In real-time monitoring
                      and infected movement data scenarios, cellular can help to determine people’s location. Based on these
                      locations, people and traffic density can also be predicted. Cellular can also support Internet-based
                      services, thereby encourage people to stay at home.
this information, several actions can be taken, such as forcing                 be feasible for outdoor environments. For outdoor environ-
people to queue before entering the building to maintain a                      ments, other wireless technologies, e.g., Bluetooth, GPS, and
safe number of people inside the facilities at the same time.                   cellular technologies, can be considered.
Another application is notifying people who want to go to a
building. Specifically, based on the number of people inside                    B. CELLULAR
the building, the authorities can encourage/force them to                       Over the past four decades, cellular networks have seen
stay home or come at a different time if the place is too                       tremendous growth throughout four generations and become
crowded. However, the accuracy of this approach depends                         the primary way of digital communications. The fifth genera-
on many factors such as the number of smart devices one                         tion (5G) of cellular networks is coming around 2020 with the
person possesses, how many devices can be connected to a                        first standard. According to the Cisco mobile traffic forecast,
network simultaneously, and whether the user connects to the                    there will be more than 13 billion mobile devices connected
access point as many people completely rely on their cellular                   to the Internet by 2023 [72]. That positions the cellular
connections.                                                                    technology at the center to enable social distancing in many
                                                                                circumstances including real-time monitoring, people density
4) STAY-AT-HOME ENCOURAGEMENT                                                   prediction and encouraging stay-at-home by enabling 5G live
Wi-Fi technology can also be used to encourage people to stay                   broadcasting, as illustrated in Fig. 8.
at home by detecting the frequency of moving outside their
houses for a particular time, e.g., a day. Specifically, when                   1) REAL-TIME MONITORING
user devices move far away from the access point inside their                   Individual tracking and mobility pattern monitoring are
houses, the connection between them will be weak or lost.                       potential approaches using cellular technology to practice
Based on this information, the access points can estimate the                   social distancing as shown in Fig. 8(a). According to the
frequency of moving out of their house and then notify the                      3GPP standard, the current cellular networks, i.e., LTE and
users to encourage them to stay at home as much as possible.                    LTE-A, are employing various localization methods such as
   Summary: Wi-Fi technology is a prominent solution to                         Assisted-GNSS (A-GNSS), Enhanced Cell-ID (E-CID), and
quickly and effectively enable, encourage, and force people                     Observed TDoA (O-TDoA) as specified in the Release 9;
to practice social distancing. With the current advances of                     Uplink-TDoA (U-TDoA) included in the Release 11; and
Wi-Fi, the accuracy of localization systems can be signifi-                     with the aids of other technologies like Wi-Fi, Bluetooth,
cantly improved, resulting in effective and precise applica-                    and Terrestrial Beacon System (TBS) as stated in the
tions for social distancing. However, Wi-Fi-based technology                    Release 13 [73], [74]. Cellphone location data collected by
is mainly used for indoor environments as this technology                       the current cellular network is normally used for network
requires several access points for localization which may not                   operations and managers [74] such as network planning and
optimization to enhance the Quality of Service (QoS) rather                 concerns compared with individual-level tracking (i.e., it sat-
than user applications due to privacy and network resource                  isfies the EU privacy rules [81]). The metadata can be used
concerns. However, in the context of social distancing, user                to obtain the mobility patterns, and thus the governments can
tracking based on data of user movement history can be                      monitor whether people are complying with the lock-down
very effective, e.g., for quarantined people detection, and                 rules or not. It can also be employed to model the spread of
infected people tracing. The authorities can check whether                  the virus to aid the governments in analyzing and evaluating
infected people are violating quarantine requirements or not.               the effectiveness of ongoing quarantine measures during the
In cases they do not follow the requirements, the authorities               outbreak.
can send warning messages or even perform some aggressive
measures, e.g., fines and arrests, to force them to self-isolate.           2) PEOPLE DENSITY PREDICTION
   Moreover, when a user has been exposed to the virus,                     In addition to the real-time crowd monitoring and modeling
the user’s mobility history can be extracted to investigate                 the spread of the virus, the movement history data can be
the spread of the virus. In these cases, the cellular technol-              utilized to predict the network traffic due to the large-scale
ogy can outperform other wireless technologies in term of                   location data provided by carriers and the recent advances of
availability and popularity. For example, localization services             machine learning. There are various works on network traffic
relying on wireless technologies such as GPS always need                    prediction proposed in [86]–[90] using the history of users’
to be run in the foreground application (i.e., the availabil-               movements. Furthermore, the number of users in a specific
ity), while this service is a part of cellular network opera-               area can also be estimated from the network traffic of that area
tions. In addition, Ultra-wideband and Zigbee technologies                  as illustrated in Fig. 8(b). Thus, the authorities can predict
require additional hardware [122], [161] (i.e., the popularity).            the crowd gathering in public places (e.g., shopping malls,
Incoming 5G networks with the presence of key technolo-                     airports, and train stations) relying on the corresponding
gies such as mm-Wave communications, D2D communica-                         forecasted network traffic. Then, appropriate actions can be
tions, and Ultra-dense networks (UDNs) [75] are capable                     performed by the authorities to prevent crowd gathering in
of performing a high precision localization. Two position-                  these places. For example, if the predicted number of people
ing schemes exploiting the mm-Wave communications are                       entering a shopping mall exceeds a threshold, the authorities
proposed in [76] based on the validation of triangulation                   can notify customers to avoid coming to this place at this time
measurements and angle of differences of arrival (ADoA).                    or recommend them to go to other shopping malls having
The simulation results show that the triangulate-validate and               lower densities. In addition, this method can also be applied
ADoA methods can obtain a sub-meter accuracy level with a                   in residential areas to study how often people stay home as
probability of 85% and 70%, respectively in a 18 m × 16 m                   well as predict when they go out or the places they come
indoor area. The authors in [77] propose a positioning scheme               to. This can provide significant data input for network traffic
in UDNs using a cascaded Extended Kalman filter (EKF)                       forecasts in public places. In addition, if they regularly go to
structure to fuse the DoA and ToA estimations from the                      non-essential places, the authorities can warn or force them
reference nodes. The proposed scheme can localize a moving                  to stay at home as much as possible.
target at speed 50 km/h with a sub-meter level accuracy in an
outdoor environment. It can be used for tracking vehicles and               3) STAY-AT-HOME ENCOURAGEMENT
monitoring the traffic density.                                             To implement social distancing, many people must do their
   Recently, some governments have required telecom com-                    daily activities remotely from their home such as working,
panies to share cellphone location data to implement social                 studying, and entertainment. Therefore, some video confer-
distancing to deal with COVID-19. For instance, Taiwan                      ence applications used to work from home or study online
deployed an ‘‘electronic fence’’ exploiting the cellular-based              have witnessed an explosion of downloads. For example,
triangulation methods to ensure that the quarantined cases                  the Zoom application has achieved an increase by 1,270%
stay in their homes [78]. The local officials call them twice               from 22 Feb to 22 Mar in 2020 [91] and the number
a day to ensure they do not leave their phones at home and                  of newly registered users of Microsoft Teams has also
visit them within 15 minutes after their phones are turned                  risen 775% monthly in Italy after the full lock-down was
off or if they move away from their homes. The Moscow                       started [92]. As a result, 5G live broadcasting technology
government is also said to be planning to use SIM card                      can be used to encourage people to stay at home while
data for tracking foreigners and residents who have close                   minimizing the impact on their work, or study (Fig. 8(c)).
contacts with foreigners when the border closure order is                   Especially, this is probably applicable to cases where land-
lifted [79]. However, individual tracking using cellular tech-              line Internet is not available. There are many works to
nology has raised concerns about privacy [80], [81]. Instead,               enhance the quality of video multicast/broadcast applications
group/crowd detecting and monitoring based on shared loca-                  by utilizing the advances of 5G networks [93]–[97]. Video
tion data which is anonymous and aggregated from carriers                   multicast/broadcast services are defined as an ultra-high def-
become the key approach utilized by several governments                     inition slice in a MIMO system [93]. To improve the spectral
such as Italy, Germany, Austria, the UK, Korea, and Aus-                    efficiency for video multicast/broadcast in the proposed sys-
tralia [82]–[85]. This approach is intended to alleviate privacy            tem, the authors introduce a hybrid digital-analog scheme to
                 FIGURE 9. Contact tracing application based on Bluetooth technology [103]. The application will record the event when
                 two people have close contact with each other. Later, when one of them is tested positive for an infectious disease,
                 the application can notify the other person.
tackle channel condition and antenna heterogeneity. Another                     forecasted network traffic. The low latency feature of 5G net-
possible solution that can significantly improve qualities for                  works in data processing using edge/fog computing enables
video multicasting/broadcasting is data caching. A novel                        quick responses of the authorities (e.g., send notifications
caching paradigm proposed in [94] is applied for multi-                         instantly), for example, to prevent close contact. However,
cast services in heterogeneous networks. With the awareness                     the use of subscriber’s location data for social distancing
of multicast files, the proposed caching policy can select                      measures is subject to great privacy concerns from citizens.
files efficiently for the caches. Studies in [95], [96] propose
using NOMA techniques to support multicast/broadcast by                         C. BLUETOOTH
increasing the spectrum efficiency in multi-user environ-                       With the explosive growth of Bluetooth-enabled devices,
ments. Finally, the authors in [97] propose a video multi-                      Bluetooth technology is another solution for social distancing
cast orchestration scheme for 5G UDNs which can help to                         in both indoor and outdoor environments. In particular, Blue-
improve the spectrum efficiency.                                                tooth is a wireless technology used for short-range wireless
                                                                                communications in the range from 2.4 to 2.485 GHz [98],
4) INFECTED MOVEMENT DATA                                                       [99]. Bluetooth devices can automatically detect and connect
Due to the omnipresence of mobile phones and the near                           to other devices nearby, forming a kind of ad-hoc called
world-wide coverage of cellular signals, cellular technology                    piconet [99]. Recently, Bluetooth Low Energy (BLE) has
can be an effective tool to track the movement of people.                       been introduced as an extended version of the classic Blue-
Unlike in the quarantined people detection scenarios where                      tooth to reduce the energy usage of devices and improve the
these people may deliberately leave their phones at home,                       communication performance [99]. Given the above, the BLE
people do not have any reason to do so in the infected move-                    localization technology possesses several advantages com-
ment data scenario. Therefore, cellular can be an effective                     pared with those of the Wi-Fi localization. First, the BLE sig-
technology in this scenario. The authors of [190] summarize                     nals have a higher sample rate than that of the Wi-Fi signals
the methods to trace human position in outdoor environments                     (i.e., 0.25 Hz ∼ 2 Hz) [100]. Second, the BLE technology
using base stations and indoor environments using access                        consumes less power than that of the Wi-Fi technology, and
points. However, the positioning accuracy for outdoor envi-                     thus it can be implemented widely in handheld devices. Third,
ronments still needs to be improved because a small error by                    the BLE signals can be obtained from most smart devices,
using the cellular network technology can cause a big error in                  while Wi-Fi signals can be obtained from only access points.
the distance measurement.                                                       Finally, BLE beacons are usually powered by battery, and
   Summary: Cellular technology can be considered one of                        thereby they are more flexible and easier to deploy than
the most important approaches to assist social distancing.                      Wi-Fi. It is worth noting that Bluetooth is mainly used for
It can be deployed on a large scale due to its convenience                      infrastructureless adhoc communications in contrast to other
and omnipresence compared to other wireless technologies.                       technologies.
It can be used to track quarantined or infected individuals.
Furthermore, it can provide a unique solution to not only                       1) CONTACT TRACING
monitor crowds in real-time, but also allow the local author-                   One application of Bluetooth in social distancing is contact
ities to predict the forming of crowds in public areas (e.g.,                   tracing [101], [102] as illustrated in Fig. 9. The key idea
airports, train stations, and shopping malls) based on the                      is using Bluetooth to detect other users in close proximity
with their information (e.g., identifier) stored in a person’s              which deploy direct-sequence spread spectrum and orthogo-
Bluetooth device, e.g., a mobile phone. When there is an                    nal frequency-division multiplexing signaling methods. Sim-
infected case, the authorities can ask people to share these                ilarly, Bluetooth devices can avoid interference from other
records as a part of a contact tracing investigation. Thereby,              wireless devices, e.g., Wi-Fi enabled devices, by using the
the authorities can detect people who may have close contact                spread-spectrum frequency hopping technique to randomly
with the infected one and notify them promptly to prevent the               use one of 79 different frequencies in Bluetooth bands.
spreading of diseases. Several attempts to use Bluetooth in                 As such, the interference from other devices is significantly
contact tracing have been reported. Apple and Google have                   reduced, thereby improving the accuracy of localization
recently introduced a mobile application (running on both                   systems.
iPhone and Android devices) that can detect other smart-
phones nearby using Bluetooth technology [103]. If a person                 3) DISTANCE BETWEEN TWO PEOPLE
is tested positive for a disease, he/she will enter the result in           Bluetooth can also be used to determine the distance between
the app to inform others about that. Then, people who may                   two persons by using their Bluetooth-enabled devices, e.g.,
have close contact with the positive case will be notified and              smartphone or smartwatch, as depicted in Fig. 10. Specifi-
instructed about what to do next. Note that a Wi-Fi or cellular             cally, similar to the Wi-Fi technology, based on RSSI levels,
connection would also be required to enable the app. Sim-                   a device can calculate the distances between itself and other
ilar apps have been recently launched in Singapore [105],                   nearby devices [113]. It is worth noting that Bluetooth tech-
Europe [107], and India [108].                                              nology can allow a device to connect to multiple devices at the
                                                                            same time [98]. Thus, the device can simultaneously detect
2) CROWD DETECTION                                                          distances to multiple devices in its coverage. If the distance
Bluetooth technology can be used to detect crowds in indoor                 is less than a given threshold, e.g. 1.5 meters [13], the devices
environments to practice social distancing with the latest                  can warn and/or encourage users to practice social distancing.
advances in Bluetooth localization techniques [111], [113].
In particular, based on signals received from users’ Bluetooth
devices, a central controller can calculate the positions of
users and detect/predict crowds in indoor environments. If a
crowd is detected, the local manager can force people to leave
to practice social distancing. In addition, they can advise
people who want to go to the place to come at a different time
if the place is too crowded at the moment. In [111], the authors
point out that with the development of BLE, Bluetooth-based
indoor localization can be considered a practical method to                 FIGURE 10. Keeping distance between any two persons using Bluetooth
                                                                            technology. A Bluetooth-enabled device such as a smartphone can
locate Bluetooth devices in indoor environments due to its                  calculate the distances between itself and other nearby
low battery cost and high communication performance. The                    Bluetooth-enabled devices. When another device comes into close
                                                                            proximity, a warning notification can be sent to the user.
authors then propose indoor localization schemes that collect
RSSI measurements to detect the user’s location by using the
triangulation mechanism.                                                       Summary: Bluetooth technology is a very promising solu-
    In [112], the authors show that the BLE technology is                   tion to enable social distancing. However, the privacy of users
strongly affected by the fast fading and interference, result-              needs to be taken into account as the applications require
ing in a low accuracy when detecting the user’s device.                     users to share information with the authorities and third par-
To improve the accuracy of the BLE positioning, the authors                 ties. This can be a research direction to ensure privacy and
run several experimental tests to choose the optimal parame-                encourage people to share their information to prevent the
ters to set up BLE localization systems. The authors demon-                 spreading of diseases. In addition, there are several draw-
strate that the BLE-based indoor localization can achieve a                 backs of Bluetooth technology in social distancing which
better performance than that of Wi-Fi localization systems.                 need to be considered such as the accuracy of localization
The authors of [114] point out that the accuracy of BLE-based               techniques when the users’ devices are located inside the
localization is strongly affected by advertising channels,                  pockets or bags and their devices always need to turn on
human movements, and human obstacles. To address these                      the Bluetooth mode. Furthermore, combining Bluetooth and
problems, they propose a dynamic AI model that can detect                   other technologies (e.g., Wi-Fi [117]) to improve the local-
human obstacles by using three BLE advertising channels.                    ization accuracy is also an open research direction.
Then, the RSSI values will be compensated accordingly.
    In [115] and [116], the authors show that Wi-Fi-based                   D. ULTRA-WIDEBAND
and Bluetooth based localization systems can be strongly                    Ultra-WideBand (UWB) technology has been deemed to be
affected by the interference from other wireless devices                    a promising candidate for precise Indoor Positioning Sys-
operating at 2.4 GHz bands. To mitigate the interference,                   tems (IPSs) that can sustain an accuracy at the centime-
Wi-Fi devices can use 802.11b and 802.11g/n standards                       ter level in the ranges from short to medium. This is due
to its unique characteristics (e.g., high time-domain res-                         Recently, device-free localization (or passive positioning)
olution, immunity of multipath, low-cost implementation,                        techniques have witnessed significant interest. This is due to
low power consumption, and good penetration) [118]. Due                         the capability to tackle inherent problems of aforementioned
to the wide bandwidth nature of UWB signals (at least                           communication-based localization approaches: (i) privacy
500 MHz as specified by FCC [119]), the impulse radio (IR)                      issues (e.g., tracking targets do not need to communicate
UWB technology has the capability of generating a series of                     with an access point/network coordinator, and thus it can
very short duration Gaussian pulses in time-domain which                        protect private information of the target), and (ii) physical
enables its advantages compared with other RF technology.                       obstacles (e.g., LOS communications have significant impact
Pulse position modulation with time hopping (TH-PPM)                            by obstacles) [126]. The high time-domain resolution feature
is the most popular modulation scheme exploited in the                          of the IR-UWB technology enables the device-free localiza-
impulse radio based UWB [120]. This pulse can directly                          tion methods relying on the changes of very short pulses
propagate in the radio channel without requiring additional                     properties between two transceivers because of absorption,
carrier modulation. The baseband-like architecture of the                       scattering, diffraction, reflection, and refraction [127], [128].
IR-UWB facilitates extremely simple and low-power trans-                        In particular, the authors in [127] use monostatic radar mod-
mitters. Thus, the advantages of the IR-UWB technology can                      ules (i.e., P410 platform) equipped with one transmitter and
greatly support social distancing, even better than other wire-                 one receiver for multi-target tracking based on Gaussian
less technologies (e.g., higher accuracy in indoor positioning                  mixture probability hypothesis density (GM-PHD) filters.
applications) or provide exclusive solutions (e.g., device-free                 Information (including raw signal, bandpass signal, motion
tracking/counting) for some scenarios, as discussed below.                      filtered signal, and detection list) extracted from the reflected
                                                                                signals is used to estimate the locations of targets with an
1) REAL-TIME MONITORING                                                         accuracy at the decimeter level. To improve the accuracy,
In this section, we review some social distancing scenarios                     a multi-static is deployed in [128] to track a person in
using Ultra-wideband technology for real-time monitoring                        real-time by determining the difference between the channel
such as crowd detection (e.g., tracking users’ location), public                impulse response with the presence of a new object and that of
place monitoring and access scheduling (e.g., counting the                      the previous one without the object. The location of the object
number of people in a specific area).                                           can be found with the mean error of only 3 cm by applying
                                                                                a leading edge detection algorithm on the difference between
a: CROWD DETECTION                                                              the two measurements. However, the limitation of this work
One of the major solutions for crowd detection is track-                        is that it can track only one target at a time. Motivated by the
ing locations of people in public areas. There are many                         above works, we can easily deploy device-free localization
commercial products exploiting the IR-UWB technology                            techniques for crowd detection in public areas without reveal-
for real-time localization in both daily life and factories                     ing any personal information and hardware requirements on
such as DecaWave [121], BeSpoon [122], Zebra [123],                             target objects. Thereby, the authorities can locate the exact
Ubisense [124]. DecaWave and BeSpoon claim their products                       locations of crowds and have appropriate actions to disperse
based on ranging measurements can offer an accuracy under                       crowds or force them to practice social distancing.
10 cm [121], [122]. Furthermore, Ubisense and Zebra provide
industrial products which can obtain a high accuracy even                       b: PUBLIC PLACE MONITORING AND ACCESS SCHEDULING
in cluttered, indoor factory environments [123], [124]. All                     A simple solution for public place monitoring is referred
of them support real-time positioning for multiple mobile                       to as device (or tag)-free counting techniques [129], [130].
tags by using the triangulation techniques based on the abso-                   Specifically, the authors in [129] propose an advanced peo-
lute locations of reference nodes or anchors (e.g., UWB                         ple counting algorithm using the revelation of the received
transceivers). Especially, the Dimension4 sensor invented                       signal pattern according to the number of people as illus-
by Ubisense can be integrated with a built-in GPS module                        trated in Fig. 11(a). This method enables people counting
for outdoor tracking purposes. Experiments conducted to                         even with the presence of dense multipath signals in the
evaluate holistically the performance of three commercial                       environment which is not able to be performed by counting
products (i.e., DecaWave, BeSpoon, and Ubisense) under                          techniques based on detecting single signals corresponding to
indoor industrial environment setting (with the presence of                     individual persons. For example, other counting approaches
NLOS) can be found in [125]. The availability of commercial                     using Wi-Fi and Zigbee rely on the number of connec-
UWB-based localization systems enables real-time people                         tions from users to an access point (i.e., Wi-Fi) or a net-
tracking in public places by localizing their UWB-supported                     work coordinator (i.e., Zigbee). Major clusters are picked up
phones, or personal belongings equipped with tags (e.g., keys                   to find main pulses having maximum amplitudes. A joint
and shoes). Thus, the authorities can detect the crowd to                       probability density function derived from these main pulses
notify them and other people in the area, disperse the crowd                    is utilized to derive the maximum likelihood (ML) equa-
or even predict and prevent the forming of the crowd by                         tion. Then, the estimated number of people is determined
using AI/Machine learning algorithms based on the previ-                        to be the figure having the maximum likelihood as shown
ously collected data.                                                           in Fig. 11(b). Similarly, the solution in [130] also provides
the crowd detecting and monitoring in public places with                        is especially important for navigation in autonomous sys-
acceptable accuracy at the decimeter level [127].                               tems, such as robots, UAVs, and self-driving cars. Thus,
                                                                                in a pandemic outbreak when people are required to stay
E. GLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS)                                   at home, GNSS-based autonomous services play a key role
The GNSS has been being the most widely used for position-                      to minimize physical contact between people. For example,
ing purposes in the outdoor environment nowadays. GNSS                          customers can shop online and receive their items with drone
satellites orbit the Earth and continuously broadcast navi-                     delivery services. Such kind of services has been introduced
gation messages. When a receiver receives the navigation                        recently by some large retail corporations such as Ama-
messages from the satellites, it calculates the distances from                  zon and DHL. Similarly, robotaxi services have been intro-
its location to the satellites based on the transmitting time in                duced recently in some countries to deal with COVID-19
the messages. Basically, to calculate the current location of a                 outbreak [143], [149]. It can be clearly seen that these
user, it requires at least three different navigation messages                  GNSS-based autonomous services can contribute a signifi-
from three different satellites (based on the Trilateration                     cant part in implementing social distancing in practice by
mechanism in Section II). However, in practice, to achieve                      minimizing the required human presence for delivery and
high accuracy in calculating the location of a user, at least                   transportation.
four different messages from four satellites are required (the
fourth one is to address the time synchronization problem                       3) KEEPING DISTANCE AND CROWD DETECTION
at the receiver) [133]. Currently, some GNSS systems (e.g.,                     In [142], the authors introduce a GNSS service which can be
Galileo [134]) can achieve an accuracy of less than 1 m. As a                   used to determine the locations of users, thereby being able to
result, GNSS systems can be considered a very promising                         warn them if they violate the social distancing requirements.
solution to enable social distancing practice.                                  In particular, in this service, mobile users are required to
                                                                                install a mobile application which can track the location of
1) REAL-TIME MONITORING                                                         the users based on GPS technology. Then, the users’ locations
Due to the outstanding features of GNSS technology in                           will be updated constantly to the service provider. Thus, based
locating people, especially in outdoor environments, this                       on the users’ locations, the service provider can determine
technology is very useful for tracking people to practice                       whether the user violates the social distancing requirements
social distancing. Specifically, most smartphones are cur-                      or not. For example, if there are more than two users located
rently equipped with GPS devices which can be used to                           too close to each other (e.g., less than two meters), the service
track locations of mobile users when needed. In the context                     provider can send warning messages to remind the users.
of a pandemic outbreak, e.g., COVID-19, people suspected                        Furthermore, in the cases where a user goes to restricted
of being infected, for example, returning from an infected                      areas, e.g., isolated areas, they will receive warning messages
area, will be required to be self-isolated. Thus, to monitor                    to be aware of using protection measures.
these people, the authorities can ask them to wear GPS-based
positioning devices to make sure that they do not leave                         4) INFECTED MOVEMENT DATA
their residences during the quarantine [146], [147]. The main                   In the infected movement data scenario, GNSS can be a very
advantage of using GNSS technology compared to Wi-Fi                            effective technology because of its world-wide coverage and
or Infrared-based solutions for people tracking is that this                    positioning accuracy is not the main concern. For the outdoor
technology allows to monitor people anywhere and anytime                        environment, using GNSS alone can be sufficient for tracking
globally, and thus even if the suspects move from one city to                   the location of infected people. With the omnipresence of
another city, the authorities still can track and monitor them.                 smartphones with built-in GPS feature, the movement path
However, one of the major disadvantages of this technology                      of the infected people can be easily determined. However,
is that it depends on the satellite signals. Thus, in some areas                the main concern in this scenario is that people have to
with weak or high interference signals (e.g., inside a building                 turn on GPS service on their smartphones, which necessitate
or in crowded areas), the location accuracy is very low [140],                  mechanisms to incentivize people to share their movement
[144], [148]. To overcome this limitation, pseudolites have                     information.
been proposed. Pseudolites are ground-based transceivers                           Summary: Although this GNSS-based service has many
that can act as an alternative for satellites to transmit GNSS                  advantages in practicing social distancing, e.g., tracking
signals. These pseudolites can be installed in the areas where                  users, keeping distance, and group monitoring, it has some
satellite signals are weak to enhance the positioning accuracy                  shortcomings which limit its applications in practice. Specif-
of the GPS. Nevertheless, pseudolites have not been widely                      ically, this service requires tracking locations of users based
deployed because of their high price and strict time synchro-                   on GPS in a real-time manner, which may cause some extra
nization requirement [145].                                                     implementation costs and privacy issues for users. Further-
                                                                                more, in terms of determining the distance between two
2) AUTOMATION                                                                   people, the accuracy of GNSS services is not high in general,
Another useful application of GNSS to practice social dis-                      especially for distances less than two meters. Thus, some
tancing is automation. It comes from the fact that GNSS                         recent advanced GNSS technologies like [136], [138], [139],
[145] can be used to improve the accuracy of the GPS. How-                 obtain Wi-Fi fingerprints by using ZigBee interference sig-
ever, these technologies are still quite expensive and have                natures. The key idea of this work is using ZigBee interfaces
not been widely deployed for public services, and thus more                to detect Wi-Fi access points which can significantly save
research in this direction should be further explored. Privacy             energy compared with using Wi-Fi interfaces. Furthermore,
issues will be discussed in Part II [1] with several solutions             a K-nearest neighbor method with the Manhattan distance is
such as location information protection and personal identity              introduced to increase the accuracy of the localization system.
protection.                                                                The experimental results show that the proposed solution can
                                                                           save 68% of energy compared with the method using Wi-Fi
F. ZIGBEE                                                                  interfaces. The accuracy is also improved by 87% compared
Zigbee is also a potential technology that can help                        to state-of-the-art Wi-Fi fingerprint-based approaches.
to enable social distancing. In particular, Zigbee is a
standard-based wireless communication technology for                       2) PUBLIC PLACE MONITORING AND ACCESS SCHEDULING
low-cost and low-power wireless networks such as wire-                     In a Zigbee system, there is a central hub, known as the
less sensor networks. A Zigbee system consists of a central                network coordinator, to control other connected devices in the
hub, e.g., network coordinator, and Zigbee-enabled devices.                network. Thus, Zigbee can be used to control the number of
Zigbee-enabled devices can communicate with each other                     people in indoor environments. Specifically, when a person
at the range of up to 65 feet (20 meters) with an unlimited                equipped with a Zigbee-enabled device (e.g., ID card or
number of hops. Compared with Wi-Fi and Bluetooth tech-                    member card) enters the place, the device will connect to
nologies, Zigbee is designed to be cheaper and simpler, mak-               the Zigbee central hub. As such, the central hub is able to
ing it possible for low-cost and low-power communications                  calculate the total number of people inside the place at a given
for smart devices [159], [160]. Moreover, Zigbee can oper-                 time. Based on this information, the local manager can ask
ate at several frequencies, such as 2.4 GHz, 868 MHz, and                  people to queue before entering the place if it is too crowded.
915 MHz. Given the above, Zigbee is ideal for constructing                    Summary: Zigbee technology can play an important role
mesh networks with long battery life and reliable communica-               in enabling social distancing during pandemic outbreaks.
tions [160]. As a result, Zigbee can be considered a promising             However, Zigbee is a relatively new technology and has
candidate in several applications that enable social distancing            not been widely adopted in our daily life, and thus limit-
during a pandemic outbreak.                                                ing its practical applications. Nevertheless, with the support
                                                                           from leading companies such as Amazon, Google, Apple,
1) CROWD DETECTION                                                         and Texas Instruments [160], the number of Zigbee-enable
One promising application of Zigbee is detecting and tracking              devices is expected to explosively increase in the near
users’ location in indoor environments. The key idea is that               future. Furthermore, combining Zigbee with other technolo-
based on the RSSI level of the received signals from the user’s            gies (e.g., Wi-Fi [163]) is also a promising research direction
Zigbee-enabled device, the Zigbee control hub can determine                to improve the performance of localization systems in terms
the location of the user. Several research works report that               of accuracy and robustness.
Zigbee localization systems can achieve high accuracy with
low-power and low-cost devices [159]. Based on the location                G. RFID
of users, the central hub can detect crowds, i.e., many users in           RFID plays a key role in real-time object localizing and
the same area, and notify the local manager to ask people to               tracking [150]. An RFID localization system usually consists
practice social distancing during a pandemic outbreak. With                of three main components: (i) RFID readers, (ii) RFID tags,
the state-of-the-art mechanisms in the literature, the accu-               and (iii) a data processing system [151]. Typically, RFID tags
racy of Zigbee localization systems is significantly improved,             can be categorized into two types: (i) active tags and (ii) pas-
making it feasible for social distancing. In [161], the authors            sive tags. A passive RFID tag can operate without requiring
propose a novel framework to enhance the localization accu-                any power source, and it is powered by the electromagnetic
racy of Zigbee devices by considering the effect of ‘‘drift                field generated by the RFID reader. In contrast, an active
phenomenon’’ when users move from one place to another                     RFID tag has its own power source, e.g., a battery, and
place in indoor environments. The authors then demonstrate                 continuously broadcasts its own signals. Active RFID tags are
that the proposed framework can increase the accuracy by up                usually used in localization systems. Thus, RFID technology
to 60% compared with conventional solutions.                               can be considered a potential technology to practice social
   Differently, in [162], the authors introduce an ensem-                  distancing.
ble mechanism to further improve the localization accuracy.
In particular, instead of using the RSSI level, the proposed               1) CROWD DETECTION
solution combines the gradient-based search, the linear least              One potential application of RFID technology is locating
square approximation, and multidimensional scaling methods                 users in the indoor environment based on recent RFID-based
together with spatial dependent weights of the environment to              localization solutions [150], [154]. To that end, each user
approximate the target’s location. In [163], the authors pro-              is equipped with an RFID tag, e.g., the staff ID or member
pose an energy-efficient indoor localization system that can               cards. Based on the backscattered signals from the RFID
tag, the RFID reader can determine the location of the user.                    tag by modeling the spline structure. Based on the users’ loca-
If there are too many people in the same area, the system                       tions, Remix can detect crowds in hospitals and advice the
can notify the authorities to take appropriate actions, e.g.,                   authorities to take appropriate actions to practice social dis-
force people to leave the area to practice social distancing.                   tancing. Note that this solution can also be deployed to detect
Several recent mechanisms in the literature can be adopted                      crowds in other places such as workplaces, schools, and
to make this application possible during pandemic outbreaks.                    supermarkets where backscatter tags can be easily attached
In [152], the authors propose an RFID-based localization sys-                   to users/customers’ cards, e.g., staff cards, student cards, and
tem for indoor environments with high localization granular-                    member cards.
ity and accuracy. The key idea of this solution is reducing the
RSSI shifts, localization error, and computational complex-                     2) PUBLIC PLACE MONITORING AND ACCESS SCHEDULING
ity by using Heron-bilateration estimation and Kalman-filter                    Another application of RFID in social distancing is monitor-
drift removal. In [153], the authors propose to use a moving                    ing the number of people inside a place, e.g., a building or
robot to enhance the accuracy of a real-time RFID-based                         supermarket. In particular, an RFID reader will be deployed
localization system. In particular, the robot is able to perform                at the main gate of a place, and users are equipped with RFID
Simultaneous Localization and Mapping (SLAM), and thus                          tags (can be either active and passive tags). The users’ tags
it can continuously interrogate all RFID tags in its area.                      can broadcast their ID (active) or send their ID upon receiving
Then, based on passive RFID tags at known locations, we can                     RF signals from the RFID reader (passive). When a user
estimate the location of target tags by properly manipulating                   enters the place, the RFID reader can receive the user’s ID
the measured backscattered power. Alternatively, in [150],                      and increase the counter value. As such, the RFID reader can
the authors propose to equipped two RFID tags at the target                     calculate the number of people inside the place. If there are
instead of only one as in conventional solutions to improve the                 too many people, the system can notify the local manager to
accuracy of localization techniques. Adding one more RFID                       force people to queue before entering the place to practice
tag possesses several advantages: (i) easy to implement and                     social distancing. This solution can be deployed in supermar-
adjust the RFID reader’s antenna, (ii) enabling fine-grained                    kets or workplaces where the customers/staff usually have
calculation, and (iii) enabling accurate calibration. The exper-                member/staff ID cards which can be equipped with RFID
imental results then show that equipping two tags at the user                   tags.
can greatly increase the localization accuracy of the system.                      Summary: RFID technology is a potential solution to
   However, the RFID technology has several limitations                         enable social distancing. However, unlike other wireless tech-
due to the fact that both the receiver and the RF source                        nologies, RFID technology has not been widely adopted in
are in the RFID reader. Specifically, the modulated sig-                        practice due to its complexity in implementation. Specifi-
nals backscattered from the RFID tag are strongly affected                      cally, to be able to detect the location of people by using RFID
by the round-trip path loss from the receiver and the RF                        technology, they need to be equipped with RFID tags. How-
source. In addition, the RFID system can also be affected                       ever, RFID tags are not readily available likes Wi-Fi access
by the near-far problem [155]. To address these problems,                       points or Bluetooth. Thus, applications of RFID technology
a few recent works propose to use bistatic and ambient                          for social distancing are still limited in practice.
backscattered communication technologies (extended ver-                            Table 2 summarizes the technologies discussed in this
sion of RFID) for localization [156], [157]. The key idea is                    Section. Technologies that have a wide communication range
separating the RF source from the receiver. The RF source                       such as cellular and GNSS are effective solutions for the sce-
now can be a dedicated carrier emitter or an ambient RF                         narios where it is necessary to track people’s location over a
source. The tag can then transmit data to the receiver by                       large area (e.g., the infected movement data scenario). On the
backscattering the RF signals generated by the RF source.                       other hand, technologies with a shorter communication range
Based on the received signals, the receiver can estimate the                    (e.g., Wi-Fi, Bluetooth, Zigbee, and RFID) are more suitable
location of the tag. In [157], the authors propose a localiza-                  for scenarios that involve indoor environments such as public
tion system based on backscatter communications to locate                       place monitoring. Moreover, technologies that can achieve
patients in a hospital. In particular, each patient is equipped                 a high positioning accuracy (e.g., Ultra-wideband and Blue-
with a backscatter tag which can backscatter signals broad-                     tooth) can be employed to keep a safe distance between any
cast by an RF source. Then, the location of a patient can be                    two people, except for GNSS since it requires a high cost
detected by a localization algorithm, namely Remix, based                       to maintain sufficient accuracy. Furthermore, most of these
on the backscattered signals from the backscatter tags. Remix                   technologies are ready to be implemented and integrated with
consists of two processes. First, the algorithm approximates                    existing systems such as smartphones. However, user privacy
the distance from the tag to the receiver based on the backscat-                is an open issue for most wireless technologies. Furthermore,
tered signals. Second, the signal paths are modeled with linear                 other emerging wireless technologies such as LoRaWAN,
splines. Then, an optimization problem is solved to find the                    Z-Wave, and NFC [158] have not been well investigated in
effective distances corresponding to the paths that are close                   the literature for positioning systems, and thus they could
to the actual paths from the tag to the receiver. As a result,                  be potential research directions for social distancing in the
Remix can accurately estimate the position of the backscatter                   future.
IV. CONCLUSION                                                                    [4] E. Lempinen. COVID-19: Economic Impact, Human Solutions. Berkeley
Social distancing has been considered a crucial measure to                            News, Accessed: Apr. 22, 2020. Accessed: Apr. 20, 2020. [Online]. Avail-
                                                                                      able: https://news.berkeley.edu/2020/04/10/covid-19-economic-impact-
prevent the spread of contagious diseases such as COVID-19.                           human-solutions/
In this article, we have presented a comprehensive survey                         [5] P. Evans. Canada Lost More Than 1 Million Jobs Last Month as COVID-
on how technologies can enable, encourage, and enforce                                19 Struck. CBC News, Apr. 9, 2020. Accessed: Apr. 20, 2020. [Online].
                                                                                      Available: https://www.cbc.ca/news/business/canada-jobs-march-covid-
social distancing. Firstly, we provided an overview of the                            19-1.5527359
social distancing, discussed its role in the current COVID-19                     [6] K. Sullivan, ABC News. (Apr. 13, 2020). Unemployment Rate
pandemic, and introduced various practical social distancing                          Predicted to Reach 10 Per Cent Amid Coronavirus Pandemic, Pushing
scenarios where the technologies can be leveraged. We then                            Australia Into Recession. Accessed: Apr. 20, 2020. [Online]. Available:
                                                                                      https://www.abc.net.au/news/2020-04-13/coronavirus-unemployment-
presented and reviewed various wireless technologies to                               covid-19-treasury-figures-jobless-rate/12145542
encourage and facilitate social distancing measures. For each                     [7] G. Gopinath, International Monetary Fund Blog. (Apr. 14, 2020).
technology, we provided an overview, examined the state-of-                           The Great Lockdown: Worst Economic Downturn Since the
                                                                                      Great Depression. Accessed: Apr. 20, 2020. [Online]. Available:
the-art, and discussed how it can be utilized in different social                     https://blogs.imf.org/2020/04/14/the-great-lockdown-worst-economic-
distancing scenarios. Other emerging technologies, such as                            downturn-since-the-great-depression/
machine learning, computer vision, thermal, ultrasound, etc.,                     [8] R. Pickert, Y. Qiu, and A. McIntyre, Bloomberg. (Apr. 8, 2020).
                                                                                      U.S. Recession Model at 100% Confirms Downturn is Already
as well as open issues in social distancing implementation and                        Here. Accessed: Apr. 20, 2020. [Online]. Available: https://www.
their potential solutions will be discussed in the companion                          bloomberg.com/graphics/us-economic-recession-tracker/
paper Part II [1].                                                                [9] BBC News. (Apr. 16, 2020). Coronavirus: World Economy ’May
                                                                                      Face Double Recession. Accessed: Apr. 20, 2020. [Online]. Available:
                                                                                      https://www.bbc.com/news/business-52306001
REFERENCES                                                                       [10] N. M. Ferguson, D. A. T. Cummings, S. Cauchemez, C. Fraser, S. Riley,
                                                                                      A. Meeyai, S. Iamsirithaworn, and D. S. Burke, ‘‘Strategies for containing
  [1] C. T. Nguyen, Y. M. Saputra, N. V. Huynh, N. T. Nguyen, T. V. Khoa,             an emerging influenza pandemic in southeast Asia,’’ Nature, vol. 437,
      B. M. Tuan, D. N. Nguyen, D. T. Hoang, T. X. Vu, E. Dutkiewicz,                 no. 7056, pp. 209–214, Sep. 2005.
      S. Chatzinotas, and B. Ottersten, ‘‘A comprehensive survey of enabling     [11] J. K. Kelso, G. J. Milne, and H. Kelly, ‘‘Simulation suggests that rapid
      and emerging technologies for social distancing—Part II: Emerging tech-         activation of social distancing can arrest epidemic development due to a
      nologies and open issues,’’ IEEE Access, 2020.                                  novel strain of influenza,’’ BMC Public Health, vol. 9, no. 1, pp. 117–127,
  [2] World Health Organization. (Jun. 29, 2020). Timeline of WHO’s                   Dec. 2009.
      Response to COVID-19. [Online]. Available: https://www.who.int/news-       [12] U. Irfan. The Math Behind Why We Need Social Distancing, Starting
      room/detail/29-06-2020-covidtimeline                                            Right Now. Vox. Apr. 22, 2020. Accessed: Apr. 20, 2020. [Online]. Avail-
  [3] World Health Organization. (Apr. 22, 2020). Coronavirus (COVID-19).             able: https://www.vox.com/2020/3/15/21180342/coronavirus-covid-19-
      Accessed: Apr. 20, 2020. [Online]. Available: https://covid19.who.int/          us-social-distancing
 [13] Department of Health. Social Distancing for Coronavirus (COVID-              [31] S. Cauchemez, A.-J. Valleron, P.-Y. Boëlle, A. Flahault, and
      19). Austral. Government, Mar. 31, 2020. Accessed: Apr. 20, 2020.                 N. M. Ferguson, ‘‘Estimating the impact of school closure on
      [Online]. Available: https://www.health.gov.au/news/health-alerts/novel-          influenza transmission from sentinel data,’’ Nature, vol. 452, no. 7188,
      coronavirus-2019-ncov-health-alert/how-to-protect-yourself-and-others-            pp. 750–754, Apr. 2008.
      from-coronavirus-covid-19/social-distancing-for-coronavirus-covid-19         [32] N. M. Ferguson, D. A. T. Cummings, C. Fraser, J. C. Cajka, P. C. Cooley,
 [14] Centers for Disease Control and Prevention. Social Distancing,                    and D. S. Burke, ‘‘Strategies for mitigating an influenza pandemic,’’
      Quarantine, and Isolation. Centers for Disease Control Prevention,                Nature, vol. 442, no. 7101, pp. 448–452, Jul. 2006.
      Apr. 4, 2020. Accessed: Apr. 20, 2020. [Online]. Available:                  [33] J. T. Wu, S. Riley, C. Fraser, and G. M. Leung, ‘‘Reducing the impact
      https://www.cdc.gov/coronavirus/2019-ncov/prevent-getting-                        of the next influenza pandemic using household-based public health
      sick/social-distancing.html                                                       interventions,’’ PLoS Med., vol. 3, no. 9, pp. 1532–1540, Sep. 2006.
 [15] Public Health England. (Mar. 30, 2020). Guidance on Social Distancing        [34] R. Glass, L. Glass, W. Beyeler, and H. Min, ‘‘Targeted social distancing
      for Everyone in the UK. Accessed: Apr. 20, 2020. [Online]. Available:             designs for pandemic influenza,’’ Emerg. Infectious Diseases, vol. 12,
      https://www.gov.uk/government/publications/covid-19-guidance-                     no. 11, pp. 1671–1681, 2006.
      on-social-distancing-and-for-vulnerable-people/guidance-on-social-           [35] S. Maharaj and A. Kleczkowski, ‘‘Controlling epidemic spread by social
      distancing-for-everyone-in-the-uk-and-protecting-older-people-and-                distancing: Do it well or not at all,’’ BMC Public Health, vol. 12, no. 1,
      vulnerable-adults                                                                 pp. 679–697, Dec. 2012.
 [16] C. Adlhoch. European Centre for Disease Prevention and                       [36] T. C. Reluga, ‘‘Game theory of social distancing in response to an epi-
      Control. Considerations relating to social distancing measures                    demic,’’ PLoS Comput. Biol., vol. 6, no. 5, May 2010, Art. no. e1000793,
      in response to COVID-19—Second update. Stockholm, Sweden.                         doi: 10.1371/journal.pcbi.1000793.
      ECDC, Mar. 2020. Accessed: Apr. 20, 2020. [Online]. Available:
                                                                                   [37] Our World in Data. (Apr. 24, 2020). Daily Confirmed COVID-19
      https://www.ecdc.europa.eu/sites/default/files/documents/covid-19-
                                                                                        Cases, Rolling 3-Day Average. Accessed: Apr. 20, 2020. [Online].
      social-distancing-measuresg-guide-second-update.pdf
                                                                                        Available: https://ourworldindata.org/grapher/daily-covid-cases-3-day-
 [17] U.S. Food and Drug Administration. (Apr. 21, 2020). Guidance on
                                                                                        average?time=2020-02-21.&country=GBR+ESP+ITA+FRA+DEU
      Social Distancing for Everyone in the UK. Accessed: Jun. 29, 2020.
                                                                                   [38] Our World in Data. (Jul. 7, 2020). Coronavirus Pandemic
      [Online]. Available: https://www.fda.gov/food/food-safety-during-
                                                                                        (COVID-19). Accessed: Jul. 7, 2020. [Online]. Available:
      emergencies/best-practices-retail-food-stores-restaurants-and-food-pick-
                                                                                        https://ourworldindata.org/coronavirus
      updelivery-services-during-covid-19
 [18] Z. Allam and D. S. Jones, ‘‘On the coronavirus (COVID-19) outbreak           [39] M. McFall-Johnsen. Countries in Asia are Facing New Waves of Coro-
      and the smart city network: Universal data sharing standards coupled              navirus Infections After Lockdowns Lift. The Same Could Happen
      with artificial intelligence (AI) to benefit urban health monitoring and          in the Rest of the World. Business Insider, Apr. 9, 2020. Accessed:
      management,’’ Healthcare, vol. 8, no. 1, pp. 46–64, Feb. 2020.                    Apr. 20, 2020. [Online]. Available: https://www.businessinsider.com/
                                                                                        countries-lift-lockdowns-face-new-waves-covid-19-2020-3
 [19] S. Agarwal, N. S. Punn, S. K. Sonbhadra, M. Tanveer, P. Nagabhushan,
      K. K. S. Pandian, and P. Saxena, ‘‘Unleashing the power of disruptive        [40] G. J. Ackland, K. Rice, B. M. Wynne, and V. Martin, ‘‘The long
      and emerging technologies amid COVID-19: A detailed review,’’                     term predictions from imperial college CovidSim Report 9,’’ 2020,
      2020, arXiv:2005.11507. [Online]. Available: http://arxiv.org/abs/                medRxiv preprint medRxiv:2020.06.18.20135004v1. [Online]. Available:
      2005.11507                                                                        https://www.medrxiv.org/content/10.1101/2020.06.18.20135004v1
 [20] C. Yang and H.-R. Shao, ‘‘WiFi-based indoor positioning,’’ IEEE              [41] R. Chowdhury, K. Heng, M. S. R. Shawon, G. Goh, D. Okonofua,
      Commun. Mag., vol. 53, no. 3, pp. 150–157, Mar. 2015.                             C. Ochoa-Rosales, V. Gonzalez-Jaramillo, A. Bhuiya, D. Reidpath,
 [21] H. Soganci, S. Gezici, and H. Poor, ‘‘Accurate positioning in ultra-              S. Prathapan, S. Shahzad, C. L. Althaus, N. Gonzalez-Jaramillo, and
      wideband systems,’’ IEEE Wireless Commun., vol. 18, no. 2, pp. 19–27,             O. H. Franco, ‘‘Dynamic interventions to control COVID-19 pandemic:
      Apr. 2011.                                                                        A multivariate prediction modelling study comparing 16 worldwide coun-
                                                                                        tries,’’ Eur. J. Epidemiol., vol. 35, no. 5, pp. 389–399, May 2020.
 [22] J. Armstrong, Y. Sekercioglu, and A. Neild, ‘‘Visible light positioning:
      A roadmap for international standardization,’’ IEEE Commun. Mag.,            [42] R. Dandekar and G. Barbastathis, ‘‘Quantifying the effect of quar-
      vol. 51, no. 12, pp. 68–73, Dec. 2013.                                            antine control in Covid-19 infectious spread using machine learn-
                                                                                        ing,’’ 2020, medRxiv preprint medRxiv:10.1101/2020.06.18.20135004v1.
 [23] A. F. G. Ferreira, D. M. A. Fernandes, A. P. Catarino, and J. L. Monteiro,
                                                                                        [Online]. Available: https://www.medrxiv.org/content/10.1101/2020.06.
      ‘‘Localization and positioning systems for emergency responders: A
                                                                                        18.20135004v1.full.pdf
      survey,’’ IEEE Commun. Surveys Tuts., vol. 19, no. 4, pp. 2836–2870,
      May 2017.                                                                    [43] P. Caley, D. J. Philp, and K. McCracken, ‘‘Quantifying social distancing
 [24] J. M. Heffernan, R. J. Smith, and L. M. Wahl, ‘‘Perspectives on the basic         arising from pandemic influenza,’’ J. Roy. Soc. Interface, vol. 5, no. 23,
      reproductive ratio,’’ J. Roy. Soc. Interface, vol. 2, no. 4, pp. 281–293,         pp. 631–639, Jun. 2008.
      Sep. 2005.                                                                   [44] M. C. Bootsma and N. M. Ferguson, ‘‘The effect of public health mea-
 [25] C. Fraser, S. Riley, R. M. Anderson, and N. M. Ferguson, ‘‘Factors that           sures on the 1918 influenza pandemic in US cities,’’ Proc. Nat. Acad. Sci.
      make an infectious disease outbreak controllable,’’ Proc. Nat. Acad. Sci.         USA, vol. 104, no. 18, pp. 7588–7593, May 2007.
      USA, vol. 101, no. 16, pp. 6146–6151, Apr. 2004.                             [45] Z. Ali. Coronavirus: Has a Second Wave of Infections Hit Iran?
 [26] H. W. Hethcote, ‘‘The mathematics of infectious diseases,’’ SIAM Rev.,            BBC, Jun. 25, 2020. Accessed: Jun. 29, 2020. [Online]. Available:
      vol. 42, no. 4, pp. 599–653, Oct. 2000.                                           https://www.bbc.com/news/52959756
 [27] L. Mao, ‘‘Agent-based simulation for weekend-extension strategies to         [46] Coronavirus Disease 2019 (COVID-19). Accessed: Apr. 29, 2020.
      mitigate influenza outbreaks,’’ BMC Public Health, vol. 11, no. 1,                [Online].         Available:       https://www.who.int/docs/default-source/
      pp. 511–521, Dec. 2011.                                                           coronaviruse/situation-reports/20200306-sitrep-46-covid-
 [28] S. Kumar, J. J. Grefenstette, D. Galloway, S. M. Albert, and D. S. Burke,         19.pdf?sfvrsn=96b04adf_4
      ‘‘Policies to reduce influenza in the workplace: Impact assessments          [47] D. Zhang, F. Xia, Z. Yang, L. Yao and W, Zhao, ‘‘Localization
      using an agent-based model,’’ Amer. J. Public Health, vol. 103, no. 8,            technologies for indoor human tracking,’’ in Proc. 5th Int. Conf.
      pp. 1406–1411, Aug. 2013.                                                         Future Inf. Technol., Busan, South Korean, May 2010, pp. 1–6, doi:
 [29] T. Timpka, H. Eriksson, E. Holm, M. Strömgren, J. Ekberg, A. Spreco,              10.1109/FUTURETECH.2010.5482731.
      and Ö. Dahlström, ‘‘Relevance of workplace social mixing dur-                [48] S. Park, H.-S. Ahn, and W. Yu, ‘‘Round-trip time-based wireless position-
      ing influenza pandemics: An experimental modelling study of work-                 ing without time synchronization,’’ in Proc. Int. Conf. Control, Autom.
      place cultures,’’ Epidemiol. Infection, vol. 144, no. 10, pp. 2031–2042,          Syst., Seoul, South Korean, Oct. 2007, pp. 2323–2326.
      Jul. 2016.                                                                   [49] D. G. Chapman and H. Robbins, ‘‘Minimum variance estimation without
 [30] G. J. Milne, J. K. Kelso, H. A. Kelly, S. T. Huband, and J. McVernon,             regularity assumptions,’’ Ann. Math. Statist., vol. 22, no. 4, pp. 581–586,
      ‘‘A small community model for the transmission of infectious diseases:            Dec. 1951.
      Comparison of school closure as an intervention in individual-based          [50] D. Dardari, P. Closas, and P. M. Djuric, ‘‘Indoor tracking: Theory,
      models of an influenza pandemic,’’ PLoS ONE, vol. 3, no. 12, p. e4005,            methods, and technologies,’’ IEEE Trans. Veh. Technol., vol. 64, no. 4,
      Dec. 2008, doi: 10.1371/journal.pone.0004005.                                     pp. 1263–1278, Apr. 2015.
[51] Wi-Fi Alliance. Wi-Fi Alliance Introduces Wi-Fi 6. Accessed:                 [71] M. Jancowicz. At Least 6 Countries Reimposed Lockdown Mea-
     Apr. 29, 2020. [Online]. Available: https://www.wi-fi.org/news-                   sures as New Coronavirus Cases Flared Up Again. Here’s What they
     events/newsroom/wi-fi-alliance-introduces-wi-fi-6                                 Looked Like. Business Insider. May 18, 2020. Accessed: Jun. 29,
[52] W. Liu, Q. Cheng, Z. Deng, H. Chen, X. Fu, X. Zheng, S. Zheng, C. Chen,           2020. [Online]. Available: https://www.businessinsider.com/countries-
     and S. Wang, ‘‘Survey on CSI-based indoor positioning systems and                 imposed-lockdown-again-after-coronavirus-case-spike-2020-5
     recent advances,’’ in Proc. Int. Conf. Indoor Positioning Indoor Navigat.    [72] Cisco. Cisco Annual Internet Report (2018–2023). Accessed:
     (IPIN), Pisa, Italy, Sep./Oct. 2019, doi: 10.1109/IPIN.2019.8911774.              Apr. 29, 2020. [Online]. Available: https://www.cisco.com/c/en/us/
[53] S. Mazuelas, A. Bahillo, R. M. Lorenzo, P. Fernandez, F. A. Lago,                 solutions/collateral/executive-perspectives/annual-internet-report/white-
     E. Garcia, J. Blas, and E. J. Abril, ‘‘Robust indoor positioning provided         paper-c11-741490.pdf
     by real-time RSSI values in unmodified WLAN networks,’’ IEEE J. Sel.         [73] J. A. del Peral-Rosado, R. Raulefs, J. A. López-Salcedo, and
     Topics Signal Process., vol. 3, no. 5, pp. 821–831, Oct. 2009.                    G. Seco-Granados, ‘‘Survey of cellular mobile radio localization meth-
[54] A. El-Naggar, A. Wassal, and K. Sharaf, ‘‘Indoor positioning using WiFi           ods: From 1G to 5G,’’ IEEE Commun. Surveys Tuts., vol. 20, no. 2,
     RSSI trilateration and INS sensor fusion system simulation,’’ in Proc.            pp. 1124–1148, 2nd Quart., 2018.
     2nd Int. Conf. Sensors, Signal Image Process., Prague, Czech Republic,       [74] C. Laoudias, A. Moreira, S. Kim, S. Lee, L. Wirola, and C. Fischione,
     Oct. 2019, pp. 21–26.                                                             ‘‘A survey of enabling technologies for network localization, track-
[55] R. C. Luo and T. J. Hsiao, ‘‘Dynamic wireless indoor localization incor-          ing, and navigation,’’ IEEE Commun. Surveys Tuts., vol. 20, no. 4,
     porating with an autonomous mobile robot based on an adaptive signal              pp. 3607–3644, 4th Quart., 2018.
     model fingerprinting approach,’’ IEEE Trans. Ind. Electron., vol. 66,        [75] M. Agiwal, A. Roy, and N. Saxena, ‘‘Next generation 5G wireless net-
     no. 3, pp. 1940–1951, Mar. 2019.                                                  works: A comprehensive survey,’’ IEEE Commun. Surveys Tuts., vol. 18,
[56] X. Guo, N. R. Elikplim, N. Ansari, L. Li, and L. Wang, ‘‘Robust                   no. 3, pp. 1617–1655, 3rd Quart., 2016.
     WiFi localization by fusing derivative fingerprints of RSS and multiple      [76] J. Palacios, G. Bielsa, P. Casari, and J. Widmer, ‘‘Single- and multiple-
     classifiers,’’ IEEE Trans. Ind. Informat., vol. 16, no. 5, pp. 3177–3186,         access point indoor localization for millimeter-wave networks,’’ IEEE
     May 2020.                                                                         Trans. Wireless Commun., vol. 18, no. 3, pp. 1927–1942, Mar. 2019.
[57] I. H. Alshami, N. A. Ahmad, S. Sahibuddin, and F. Firdaus, ‘‘Adaptive        [77] M. Koivisto, M. Costa, J. Werner, K. Heiska, J. Talvitie, K. Leppanen,
     indoor positioning model based on WLAN-fingerprinting for dynamic                 V. Koivunen, and M. Valkama, ‘‘Joint device positioning and clock syn-
     and multi-floor environments,’’ Sensors, vol. 17, no. 8, pp. 1789–1818,           chronization in 5G ultra-dense networks,’’ IEEE Trans. Wireless Com-
     Aug. 2017.                                                                        mun., vol. 16, no. 5, pp. 2866–2881, May 2017.
[58] B. Wang, X. Liu, B. Yu, R. Jia, and X. Gan, ‘‘An improved                    [78] BBC Technology. (Mar. 24, 2020). Coronavirus: Under Surveillance
     WiFi positioning method based on fingerprint clustering and signal                and Confined at Home in Taiwan. Accessed: Apr. 20, 2020. [Online].
     weighted Euclidean distance,’’ Sensors, vol. 19, no. 10, pp. 2300–2320,           Available: https://www.bbc.com/news/technology-52017993
     May 2019.                                                                    [79] S. Sandurskaya. Moscow Plans Coronavirus Surveillance for Foreigners.
[59] L. Chang, X. Chen, Y. Wang, D. Fang, J. Wang, T. Xing, and Z. Tang,               The Moscow Times, Apr. 9, 2020. Accessed: Apr. 20, 2020. [Online].
     ‘‘FitLoc: Fine-grained and low-cost device-free localization for multiple         Available:       https://www.themoscowtimes.com/2020/04/09/moscow-
     targets over various areas,’’ IEEE/ACM Trans. Netw., vol. 25, no. 4,              plans-coronavirus-surveillance-for-foreigners-kommersant-a69928
     pp. 1994–2007, Aug. 2017.                                                    [80] C. Timberg and D. Harwell. Government Efforts to Track Virus Through
[60] F. Adib and D. Katabi, ‘‘See through walls with WiFi!’’ in Proc.                  Phone Location Data Complicated by Privacy Concerns. The Wash-
     ACM SIGCOMM Conf. SIGCOMM, Hong Kong, Aug. 2013,                                  ington Post, Mar. 20, 2020. Accessed: Apr. 20, 2020. [Online]. Avail-
     pp. 75–86.                                                                        able: https://www.washingtonpost.com/technology/2020/03/19/privacy-
[61] Y. Jia, Z. Zhou, F. Chen, P. Duan, Z. Guo, and S. Mumtaz, ‘‘A non-                coronavirus-phone-data/
     intrusive cyber physical social sensing solution to people behavior track-   [81] K. Lyons, The Verge. (Mar. 23, 2020). Governments Around
     ing: Mechanism, prototype, and field experiments,’’ Sensors, vol. 17,             the World are Increasingly Using Location Data to Manage
     no. 1, pp. 143–161, Jan. 2017.                                                    the Coronavirus. Accessed: Apr. 20, 2020. [Online]. Available:
[62] X. Ge and Z. Qu, ‘‘Optimization WiFi indoor positioning KNN algorithm             https://www.theverge.com/2020/3/23/21190700/eu-mobile-carriers-
     location-based fingerprint,’’ in Proc. 7th IEEE Int. Conf. Softw. Eng.            customer-data-coronavirus-south-korea-taiwan-privacy
     Service Sci. (ICSESS), Beijing, China, Aug. 2016, pp. 135–137.               [82] E. Pollina and D. Busvine. Reuters. (Mar. 19, 2020). European
[63] A. Sciarrone, C. Fiandrino, I. Bisio, F. Lavagetto, D. Kliazovich, and            Mobile Operators Share Data for Coronavirus Fight. Accessed:
     P. Bouvry, ‘‘Smart probabilistic fingerprinting for indoor localization           Apr. 20, 2020. [Online]. Available: https://www.reuters.com/article/us-
     over fog computing platforms,’’ in Proc. 5th IEEE Int. Conf. Cloud Netw.          health-coronavirus-europe-telecoms/european-mobile-operators-share-
     (Cloudnet), Pisa, Italy, Oct. 2016, pp. 39–44.                                    data-for-coronavirus-fight-idUSKBN2152C2
[64] Y. Zhuang, Z. Syed, Y. Li, and N. El-Sheimy, ‘‘Evaluation of two WiFi        [83] J. Jay. Teiss. (Mar. 23, 2020). UK Telecom Operators to Share Citizens’
     positioning systems based on autonomous crowdsourcing of handheld                 Location Data With the Government. Accessed: Apr. 20, 2020. [Online].
     devices for indoor navigation,’’ IEEE Trans. Mobile Comput., vol. 15,             Available: https://www.teiss.co.uk/government-telecom-location-data/
     no. 8, pp. 1982–1995, Aug. 2016.                                             [84] K. Eun-Jin, Business Korea. (Mar. 26, 2020). SK Telecom Joins
[65] H. Zou, M. Jin, H. Jiang, L. Xie, and C. Spanos, ‘‘WinIPS: WiFi-based             Forces With North Gyeongsang Provincial Police Agency to Con-
     non-intrusive IPS for online radio map construction,’’ in Proc. IEEE Conf.        tain COVID-19 Spread. Accessed: Apr. 20, 2020. [Online]. Available:
     Comput. Commun. Workshops (INFOCOM WKSHPS), San Francisco,                        http://www.businesskorea.co.kr/news/articleView.html?idxno=43290
     CA, USA, Apr. 2016, pp. 1081–1082.                                           [85] C. Rowland. Ausdroid, Apr. 5, 2020. Vodafone Handed Over ‘Aggregate
[66] W. Lan and H. Li, ‘‘A Modified KNN indoor WiFi localization method                Network Information’ to Governments to Allow Measurement of
     with k-median cluster,’’ in Proc. IOP Conf. Ser. Mater. Sci. Eng.,                Australian’s Movements. Accessed: Apr. 20, 2020. [Online]. Available:
     Shanghai, China, May 2019, pp. 12008–12015.                                       https://ausdroid.net/2020/04/05/vodafone-handed-over-mobile-phone-
[67] Y. Zhong, Z. Yuan, Y. Li, and B. Yang, ‘‘A WiFi positioning algorithm             location-data-to-governments-to-allow-them-to-map-australians-
     based on deep learning,’’ in Proc. 7th Int. Conf. Inf., Commun. Netw.             movements/
     (ICICN), Macao, China, Apr. 2019, pp. 99–104.                                [86] I. Alawe, A. Ksentini, Y. Hadjadj-Aoul, and P. Bertin, ‘‘Improving
[68] C. Cai, L. Deng, M. Zheng, and S. Li, ‘‘PILC: Passive indoor localization         traffic forecasting for 5G core network scalability: A machine
     based on convolutional neural networks,’’ in Proc. Ubiquitous Posi-               learning approach,’’ IEEE Netw., vol. 32, no. 6, pp. 42–49,
     tioning, Indoor Navigat. Location-Based Services (UPINLBS), Wuhan,                Nov. 2018.
     China, Mar. 2018, pp. 1–6, doi: 10.1109/UPINLBS.2018.8559775.                [87] C. Wang, L. Ma, R. Li, T. S. Durrani, and H. Zhang, ‘‘Exploring trajectory
[69] A. Bose and C. H. Foh, ‘‘A practical path loss model for indoor WiFi posi-        prediction through machine learning methods,’’ IEEE Access, vol. 7,
     tioning enhancement,’’ in Proc. 6th Int. Conf. Inf., Commun. Signal Pro-          pp. 101441–101452, Jul. 2019.
     cess., Singapore, Dec. 2007, pp. 1–5, doi: 10.1109/ICICS.2007.4449717.       [88] V. Sciancalepore, K. Samdanis, X. Costa-Perez, D. Bega, M. Gramaglia,
[70] J.-S. Lim, W.-H. Jang, G.-W. Yoon, and D.-S. Han, ‘‘Radio map update              and A. Banchs, ‘‘Mobile traffic forecasting for maximizing 5G network
     automation for WiFi positioning systems,’’ IEEE Commun. Lett., vol. 17,           slicing resource utilization,’’ in Proc. IEEE INFOCOM, Atlanta, GA,
     no. 4, pp. 693–696, Apr. 2013.                                                    USA, May 2017, pp. 1–9, doi: 10.1109/INFOCOM.2017.8057230.
 [89] D. Bega, M. Gramaglia, M. Fiore, A. Banchs, and X. Costa-Perez,               [111] Y. Wang, Q. Ye, J. Cheng, and L. Wang, ‘‘RSSI-based Bluetooth indoor
      ‘‘DeepCog: Cognitive network management in sliced 5G networks with                  localization,’’ in Proc. 11th Int. Conf. Mobile Ad-Hoc Sensor Netw.
      deep learning,’’ in Proc. IEEE Conf. Comput. Commun., Paris, France,                (MSN), Shenzhen, China, Dec. 2015, pp. 165–171.
      Apr. 2019, pp. 280–288.                                                       [112] R. Faragher and R. Harle, ‘‘Location fingerprinting with Bluetooth
 [90] Y. Sun, Y. Chang, M. Hu, and T. Zeng, ‘‘A universal predictive mobility             low energy beacons,’’ IEEE J. Sel. Areas Commun., vol. 33, no. 11,
      management scheme for urban ultra-dense networks with Control/Data                  pp. 2418–2428, Nov. 2015.
      plane separation,’’ IEEE Access, vol. 5, pp. 6015–6026, Apr. 2017.            [113] Y. Wang, X. Yang, Y. Zhao, Y. Liu, and L. Cuthbert, ‘‘Bluetooth posi-
 [91] S. Williams, IT Brief. Mar. 25, 2020. COVID-19: Zoom Down-                          tioning using RSSI and triangulation methods,’’ in Proc. IEEE 10th
      loads Explode as People Work From Home. Accessed: Apr. 20,                          Consum. Commun. Netw. Conf. (CCNC), Las Vegas, NV, USA, Jan. 2013,
      2020. [Online]. Available: https://itbrief.com.au/story/covid-19-zoom-              pp. 837–842.
      downloads-explode-as-people-work-from-home                                    [114] S. Naghdi and K. O’Keefe, ‘‘Detecting and correcting for human obsta-
 [92] M. Giles, Forbes. Mar. 30, 2020. Microsoft Teams Has Seen a                         cles in BLE trilateration using artificial intelligence,’’ Sensors, vol. 20,
      775% Rise in Users in Italy Because of COVID-19. Accessed:                          no. 5, pp. 1350–1367, Feb. 2020.
      Apr. 20, 2020. [Online]. Available: https://www.forbes.com/                   [115] L. Pei, J. Liu, Y. Chen, R. Chen, and L. Chen, ‘‘Evaluation of
      sites/martingiles/2020/03/30/microsoft-cloud-service-775-percent-                   fingerprinting-based WiFi indoor localization coexisted with Bluetooth,’’
      rise-covid-19/#6dada6236862                                                         J. Global Positioning Syst., vol. 15, no. 1, Oct. 2017.
 [93] B. Tan, J. Lu, J. Wu, D. Zhang, and Z. Zhang, ‘‘Toward a network slice        [116] L. Pei, J. Liu, R. Guinness, Y. Chen, T. Kroger, R. Chen, and L. Chen,
      design for ultra high definition video broadcasting in 5G,’’ IEEE Wireless          ‘‘The evaluation of WiFi positioning in a Bluetooth and WiFi coexistence
      Commun., vol. 25, no. 4, pp. 88–94, Aug. 2018.                                      environment,’’ in Proc. Ubiquitous Positioning, Indoor Navigat., Loca-
 [94] K. Poularakis, G. Iosifidis, V. Sourlas, and L. Tassiulas, ‘‘Exploiting             tion Based Service (UPINLBS), Helsinki, Finland, Oct. 2012, pp. 1–6,
      caching and multicast for 5G wireless networks,’’ IEEE Trans. Wireless              doi: 10.1109/UPINLBS.2012.6409768.
      Commun., vol. 15, no. 4, pp. 2995–3007, Apr. 2016.                            [117] I. G.-Tejada, E. I. Sandoval, and R. Brena, ‘‘WiFi Bluetooth based
 [95] J. Montalban, P. Scopelliti, M. Fadda, E. Iradier, C. Desogus, P. Angueira,         combined positioning algorithm,’’ Procedia Eng., vol. 35, pp. 101–108,
      M. Murroni, and G. Araniti, ‘‘Multimedia multicast services in 5G net-              Jan. 2012.
      works: Subgrouping and non-orthogonal multiple access techniques,’’           [118] Z. Sahinoglu, S. Gezici, and I. Güvenc, Ultra-Wideband Positioning Sys-
      IEEE Commun. Mag., vol. 56, no. 3, pp. 91–95, Mar. 2018.                            tems: Theor. Limits, Ranging Algorithms, Protocols. Cambridge, U.K.:
 [96] L. Lv, J. Chen, Q. Ni, and Z. Ding, ‘‘Design of cooperative non-                    Cambridge Univ. Press, 2008.
      orthogonal multicast cognitive multiple access for 5G systems: User           [119] Federal Communications Commission, ‘‘Revision of part 15 of the com-
      scheduling and performance analysis,’’ IEEE Trans. Commun., vol. 65,                mission’s rules regarding ultra-wideband transmission systems,’’ FCC,
      no. 6, pp. 2641–2656, Jun. 2017.                                                    Washington, DC, USA, Tech. Rep. 02-48, Apr. 2002.
 [97] X. Zhang, M. Yang, Y. Zhao, J. Zhang, and J. Ge, ‘‘An SDN-based               [120] I. Oppermann, M. Hämäläinen, and J. Iinatti, UWB Theory and Applica-
      video multicast orchestration scheme for 5G ultra-dense networks,’’ IEEE            tions. Hoboken, NJ, USA: Wiley, 2004.
      Commun. Mag., vol. 55, no. 12, pp. 77–83, Dec. 2017.                          [121] Decawave. DecaWave Technology. Accessed: Apr. 20, 2020. [Online].
 [98] Bluetooth SIG. Bluetooth Technology. Accessed: Apr. 20, 2020. [Online].             Available: https://www.decawave.com/technology1/
      Available: https://www.bluetooth.com/                                         [122] Bespoon. BeSpoon Technology. Accessed: Apr. 20, 2020. [Online]. Avail-
 [99] N. Todtenberg and R. Kraemer, ‘‘A survey on Bluetooth multi-hop net-                able: http://bespoon.com/technology/precise-location-rtls/
      works,’’ Ad Hoc Netw., vol. 93, pp. 101922–101949, Jun. 2019.                 [123] Zebra. Zebra Technologies. Accessed: Apr. 20, 2020. [Online]. Avail-
[100] Y. Zhuang, J. Yang, Y. Li, L. Qi, and N. El-Sheimy, ‘‘Smartphone-based              able: https://www.zebra.com/ap/en/products/location-technologies/ultra-
      indoor localization with Bluetooth low energy beacons,’’ Sensors, vol. 16,          wideband.html
      no. 5, pp. 596–616, 2016.                                                     [124] Ubisense. Ubisense. Accessed: Apr. 20, 2020. [Online]. Available:
[101] R. Gredley. 7News. (Mar. 25, 2020). Phone Tracking Considered to Curb               https://ubisense.com/dimension4/
      Spread of COVID-19. Accessed: Apr. 20, 2020. [Online]. Available:             [125] A. R. J. Ruiz and F. S. Granja, ‘‘Comparing ubisense, BeSpoon, and
      https://7news.com.au/lifestyle/health-wellbeing/phone-tracking-on-                  DecaWave UWB location systems: Indoor performance analysis,’’ IEEE
      cards-for-virus-tracing-c-761265                                                    Trans. Instrum. Meas., vol. 66, no. 8, pp. 2106–2117, Aug. 2017.
[102] K. Mingis. Computer World. (May 5, 2020). Tech Pitches in to                  [126] R. C. Shit, S. Sharma, D. Puthal, P. James, B. Pradhan, A. V. Moorsel,
      Fight COVID-19 Pandemic. Accessed: Apr. 20, 2020. [Online]. Avail-                  A. Y. Zomaya, and R. Ranjan, ‘‘Ubiquitous localization (UbiLoc):
      able: https://www.computerworld.com/article/3534478/tech-pitches-in-                A survey and taxonomy on device free localization for smart
      to-fight-covid-19-pandemic.html                                                     world,’’ IEEE Commun. Surveys Tuts., vol. 21, no. 4, pp. 3532–3564,
[103] T. Romm, D. Harwell, E. Dwoskin, and C. Timberg. Washington                         4th Quart., 2019.
      Post, Apr. 11, 2020. Apple, Google Debut Major Effort to Help                 [127] B. Gulmezoglu, M. B. Guldogan, and S. Gezici, ‘‘Multiperson track-
      People Track if They’ve Come in Contact With Coronavirus. Accessed:                 ing with a network of ultrawideband radar sensors based on Gaussian
      Apr. 20, 2020. [Online]. Available: https://www.washingtonpost.                     mixture PHD filters,’’ IEEE Sensors J., vol. 15, no. 4, pp. 2227–2237,
      com/technology/2020/04/10/apple-google-tracking-coronavirus/                        Apr. 2015.
[104] (Apple). Privacy-Preserving Contact Tracing. Accessed: Apr. 20, 2020.         [128] A. Ledergerber and R. D’Andrea, ‘‘A multi-static radar network
      [Online]. Available: https://www.apple.com/covid19/contacttracing                   with ultra-wideband radio-equipped devices,’’ Sensors, vol. 20, no. 6,
[105] Safer Together. TraceTogether. Accessed: Apr. 20, 2020. [Online]. Avail-            pp. 1599–1619, Mar. 2020.
      able: https://www.tracetogether.gov.sg/                                       [129] J. W. Choi, D. H. Yim, and S. H. Cho, ‘‘People counting based on an
[106] MIT. PACT: Private Automated Contact Tracing. Accessed:                             IR-UWB radar sensor,’’ IEEE Sensors J., vol. 17, no. 17, pp. 5717–5727,
      Apr. 20, 2020. [Online]. Available: https://pact.mit.edu/                           Sep. 2017.
[107] PEPP-PT. Pan-European Privacy-Preserving Proximity Tracing.                   [130] S. Bartoletti, A. Conti, and M. Z. Win, ‘‘Device-free counting via
      Accessed: Apr. 20, 2020. [Online]. Available: https://www.pepp-pt.org/              wideband signals,’’ IEEE J. Sel. Areas Commun., vol. 35, no. 5,
[108] D. K. Bhavani, The Hindu. (Apr. 6, 2020). This App Scores You on                    pp. 1163–1174, May 2017.
      Your Social Distancing Amid the Coronavirus Pandemic. Accessed:               [131] T. Ertan, B. M. Ledvina, R. W. Brumley, A. S. Meyer, and
      Apr. 20, 2020. [Online]. Available: https://www.thehindu.com/sci-                   P. C. Tsoi, ‘‘Electronic devices with motion sensing and angle
      tech/technology/dror-app-adds-bluetooth-feature-which-scores-users-                 of arrival detection circuitry,’’ U.S. Patent 0 317 177 A1, Oct. 17,
      on-their-social-distancing/article31268723.ece                                      2019.
[109] C. T. Nguyen, D. T. Hoang, D. N. Nguyen, D. Niyato, H. T. Nguyen,             [132] B. Großwindhager, M. Stocker, M. Rath, C. A. Boano, and K. Römer,
      and E. Dutkiewicz, ‘‘Proof-of-stake consensus mechanisms for future                 ‘‘SnapLoc: An ultra-fast UWB-based indoor localization system for an
      blockchain networks: Fundamentals, applications and opportunities,’’                unlimited number of tags,’’ in Proc. 18th Int. Conf. Inf. Process. Sensor
      IEEE Access, vol. 7, pp. 85727–85745, Jun. 2019.                                    Netw., Montreal, QC, Canada, Apr. 2019, pp. 61–72.
[110] A. Dorri, M. Steger, S. S. Kanhere, and R. Jurdak, ‘‘BlockChain: A dis-       [133] S. Dawoud. (May 2012). GNSS Principles and Comparison.
      tributed solution to automotive security and privacy,’’ IEEE Commun.                [Online].         Available:        https://pdfs.semanticscholar.org/f77d/
      Mag., vol. 55, no. 12, pp. 119–125, Dec. 2017.                                      36966cfd66be3d1feefe9faae1a6aa7e2756.pdf
[134] European Global Navigation Satellite Systems Agency. (May 27, 2014).           [155] N. Van Huynh, D. T. Hoang, X. Lu, D. Niyato, P. Wang, and D. I. Kim,
      The Results are in: Galileo Increases the Accuracy of Location                       ‘‘Ambient backscatter communications: A contemporary survey,’’ IEEE
      Based Services. Accessed: Apr. 20, 2020. [Online]. Available:                        Commun. Surveys Tuts., vol. 20, no. 4, pp. 2889–2922, 4th Quart., 2018.
      https://www.gsa.europa.eu/newsroom/news/results-are-galileo-                   [156] F. Jameel, R. Duan, Z. Chang, A. Liljemark, T. Ristaniemi, and R. Jantti,
      increases-accuracy-location-based-services                                           ‘‘Applications of backscatter communications for healthcare networks,’’
[135] S. Čapkun, M. Hamdi, and J.-P. Hubaux, ‘‘GPS-free positioning in mobile              IEEE Netw., vol. 33, no. 6, pp. 50–57, Nov. 2019.
      ad hoc networks,’’ Cluster Comput., vol. 5, no. 2, pp. 157–167, Apr. 2002.     [157] D. Vasisht, G. Zhang, O. Abari, H.-M. Lu, J. Flanz, and D. Katabi, ‘‘In-
[136] M. Shao and X. Sui, ‘‘Study on differential GPS positioning methods,’’ in            body backscatter communication and localization,’’ in Proc. Conf. ACM
      Proc. Int. Conf. Comput. Sci. Mech. Autom. (CSMA), Hangzhou, China,                  Special Interest Group Data Commun., Budapest, Hungary, Aug. 2018,
      Oct. 2015, pp. 223–225.                                                              pp. 132–146.
[137] N. C. Talbot, M. T. Allison, M. E. Nichols, ‘‘Centimeter accurate global       [158] DataFlair Team. (Sep. 15, 2018). IoT Technology & Protocols—7 Impor-
      positioning system receiver for on-the-fly real-time kinematic measure-              tant IoT Communication Protocols. Accessed: May 12, 2020. [Online].
      ment and control,’’ U.S. Patent 5 519 620, May 21, 1996.                             Available: https://data-flair.training/blogs/iot-technology/
[138] A. Al-Shaery, S. Zhang, and C. Rizos, ‘‘An enhanced calibration method         [159] L. Luoh, ‘‘ZigBee-based intelligent indoor positioning system soft com-
      of GLONASS inter-channel bias for GNSS RTK,’’ GPS Solutions, vol. 17,                puting,’’ Soft Comput., vol. 18, no. 3, pp. 443–456, Jun. 2013.
      no. 2, pp. 165–173, Apr. 2013.                                                 [160] Zigbee Alliance. Zigbee. Accessed: Apr. 20, 2020. [Online]. Available:
                                                                                           https://zigbeealliance.org/
[139] R. Tu, J. Liu, R. Zhang, L. Fan, P. Zhang, and J. Han, ‘‘Real-time kine-
                                                                                     [161] C.-H. Chu, C.-H. Wang, C.-K. Liang, W. Ouyang, J.-H. Cai, and
      matic positioning algorithm with GNSS and high-frequency accelerom-
                                                                                           Y.-H. Chen, ‘‘High-accuracy indoor personnel tracking system with a
      eter observations for broadband signals,’’ Meas. Sci. Technol., vol. 31,
                                                                                           ZigBee wireless sensor network,’’ in Proc. 7th Int. Conf. Mobile Ad-Hoc
      no. 3, pp. 35007–35020, Dec. 2019.
                                                                                           Sensor Netw., Beijing, China, Dec. 2011, pp. 398–402.
[140] J. Soubielle, I. Fijalkow, P. Duvaut, and A. Bibaut, ‘‘GPS positioning in      [162] S.-H. Fang, C.-H. Wang, T.-Y. Huang, C.-H. Yang, and Y.-S. Chen, ‘‘An
      a multipath environment,’’ IEEE Trans. Signal Process., vol. 50, no. 1,              enhanced ZigBee indoor positioning system with an ensemble approach,’’
      pp. 141–150, Jan. 2002.                                                              IEEE Commun. Lett., vol. 16, no. 4, pp. 564–567, Apr. 2012.
[141] P. Dabove and V. Di Pietra, ‘‘Towards high accuracy GNSS real-time posi-       [163] J. Niu, B. Wang, L. Shu, T. Q. Duong, and Y. Chen, ‘‘ZIL: An energy-
      tioning with smartphones,’’ Adv. Space Res., vol. 63, no. 1, pp. 94–102,             efficient indoor localization system using ZigBee radio to detect WiFi
      Jan. 2019.                                                                           fingerprints,’’ IEEE J. Sel. Areas Commun., vol. 33, no. 7, pp. 1431–1442,
[142] G. B. Al-Suwaidi and M. J. Zemerly, ‘‘Locating friends and family                    Jul. 2015.
      using mobile phones with global positioning system (GPS),’’ in Proc.           [164] B. Mitchell, Lifewire. (Nov. 10, 2019). What is the Range of a Typ-
      IEEE/ACS Int. Conf. Comput. Syst. Appl., Rabat, Morocco, May 2009,                   ical Wi-Fi Network? Accessed: Apr. 20, 2020. [Online]. Available:
      pp. 555–558.                                                                         https://www.lifewire.com/range-of-typical-wifi-network-816564
[143] I. Dayarian, M. Savelsbergh, and J.-P. Clarke, ‘‘Same-day delivery with        [165] Bluetooth. Understanding Bluetooth Range. Accessed: Apr. 20, 2020.
      drone resupply,’’ Transp. Sci., vol. 54, no. 1, pp. 229–249, Jan. 2020.              [Online].         Available:        https://www.bluetooth.com/learn-about-
[144] R. Xu, W. Chen, Y. Xu, S. Ji, and J. Liu, ‘‘Improved GNSS-based indoor               bluetooth/bluetooth-technology/range/
      positioning algorithm for mobile devices,’’ GPS Solutions, vol. 21, no. 4,     [166] IMPINJ. Various Systems Using RAIN RFID Technology. Accessed:
      pp. 1721–1733, Oct. 2017.                                                            Apr. 20, 2020. [Online]. Available: https://www.impinj.com/about-
[145] C. Ma, J. Yang, J. Chen, and Y. Tang, ‘‘Time synchronization require-                rfid/types-of-rfid-systems
      ment of global navigation satellite system augmentation system based on        [167] M. Idoudi, H. Elkhorchani, and K. Grayaa, ‘‘Performance evaluation
      pseudolite,’’ Meas. Control, vol. 52, nos. 3–4, pp. 303–313, Mar. 2019.              of Wireless Sensor Networks based on ZigBee technology in smart
[146] S. Y. A. Tsui and A. S. Shalaby, ‘‘Enhanced system for link and mode                 home,’’ in Proc. Int. Conf. Electr. Eng. Softw. Appl., Hammamet, Tunisia,
      identification for personal travel surveys based on global positioning               Mar. 2013, doi: 10.1109/ICEESA.2013.6578423.
      systems,’’ Transp. Res. Rec. J. Transp. Res. Board, vol. 1972, no. 1,          [168] B. Jang and H. Kim, ‘‘Indoor positioning technologies without offline
      pp. 38–45, Jan. 2006.                                                                fingerprinting map: A survey,’’ IEEE Commun. Surveys Tuts., vol. 21,
[147] G. M. Vazquez-Prokopec, D. Bisanzio, S. T. Stoddard, V. Paz-Soldan,                  no. 1, pp. 508–525, 1st Quart., 2019.
      A. C. Morrison, J. P. Elder, J. Ramirez-Paredes, E. S. Halsey, T. J. Kochel,   [169] L. Shahid, H. Shahid, M. A. Riaz, S. I. Naqvi, M. J. Khan,
      T. W. Scott, and U. Kitron, ‘‘Using GPS technology to quantify human                 M. S. Khan, Y. Amin, and J. Loo, ‘‘Chipless RFID tag for touch
      mobility, dynamic contacts and infectious disease dynamics in a resource-            event sensing and localization,’’ IEEE Access, vol. 8, pp. 502–513,
      poor urban environment,’’ PLoS ONE, vol. 8, no. 4, pp. 58802–58812,                  Jan. 2020.
      Apr. 2013.                                                                     [170] Y. Ma, B. Wang, X. Gao, and W. Ning, ‘‘The gray analysis and machine
[148] X. Li, ‘‘A GPS-based indoor positioning system with delayed repeaters,’’             learning for device-free multitarget localization in passive UHF RFID
      IEEE Trans. Veh. Technol., vol. 68, no. 2, pp. 1688–1701, Feb. 2019.                 environments,’’ IEEE Trans. Ind. Informat., vol. 16, no. 2, pp. 802–813,
                                                                                           Feb. 2020.
[149] N. Zart, Electrek. Mar. 16, 2020. WeRide Resumes Robotaxi Service
                                                                                     [171] V. Bianchi, P. Ciampolini, and I. De Munari, ‘‘RSSI-based indoor local-
      in China After COVID-19. Accessed: May 12, 2020. [Online]. Avail-
                                                                                           ization and identification for ZigBee wireless sensor networks in smart
      able: https://electrek.co/2020/03/16/weride-resumes-robotaxi-service-in-
                                                                                           homes,’’ IEEE Trans. Instrum. Meas., vol. 68, no. 2, pp. 566–575,
      china-after-covid-19/
                                                                                           Feb. 2019.
[150] F. Xiao, Z. Wang, N. Ye, R. Wang, and X.-Y. Li, ‘‘One more tag enables         [172] Y.-T. Chen, C.-L. Yang, Y.-K. Chang, and C.-P. Chu, ‘‘A RSSI-based
      fine-grained RFID localization and tracking,’’ IEEE/ACM Trans. Netw.,                algorithm for indoor localization using Zigbee in wireless sensor net-
      vol. 26, no. 1, pp. 161–174, Feb. 2018.                                              work,’’ in Proc. 15th Int. Conf. Distrib. Multimedia Syst. (DMS), 2009,
[151] J. Wang, R. K. Dhanapal, P. Ramakrishnan, B. Balasingam, T. Souza, and               pp. 70–75.
      R. Maev, ‘‘Active RFID based indoor localization,’’ in Proc. IEEE Int.         [173] K. Subaashini, G. Dhivya, and R. Pitchiah, ‘‘ZigBee RF signal strength
      Conf. Inf. Fusion (FUSION), Ottawa, ON, Canada, Jul. 2019, pp. 1–7.                  for indoor location sensing-experiments and results,’’ in Proc. Int. Conf.
[152] C.-H. Huang, L.-H. Lee, C. C. Ho, L.-L. Wu, and Z.-H. Lai, ‘‘Real-time               Adv. Commun. Technol. (ICACT), PyeongChang, South Korea, Jan. 2013,
      RFID indoor positioning system based on Kalman-filter drift removal                  pp. 50–57.
      and heron-bilateration location estimation,’’ IEEE Trans. Instrum. Meas.,      [174] Aqua Plumbing & Air. (Feb. 26, 2017). 5 Things You Should Know
      vol. 64, no. 3, pp. 728–739, Mar. 2015.                                              About a Chronic Cough. Accessed: May 12, 2020. [Online]. Available:
[153] S. Megalou, A. Tzitzis, S. Siachalou, T. Yioultsis, J. Sahalos,                      https://www.aquaplumbingsarasota.com/article/5-things-know-chronic-
      E. Tsardoulias, A. Filotheou, A. Symeonidis, L. Petrou, A. Bletsas, and              cough
      A. G. Dimitriou, ‘‘Fingerprinting localization of RFID tags with real-         [175] Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, ‘‘DeepFace: Closing
      time performance-assessment, using a moving robot,’’ in Proc. Eur. Conf.             the gap to human-level performance in face verification,’’ in Proc. IEEE
      Antennas Propag. (EuCAP), Krakow, Poland, Mar./Apr. 2019, pp. 1–5.                   Conf. Comput. Vis. Pattern Recognit., Columbus, OH, USA, Jun. 2014,
[154] P. Yang, W. Wu, M. Moniri, and C. C. Chibelushi, ‘‘Efficient object                  pp. 1701–1708.
      localization using sparsely distributed passive RFID tags,’’ IEEE Trans.       [176] A. Ward, A. Jones, and A. Hopper, ‘‘A new location technique for the
      Ind. Electron., vol. 60, no. 12, pp. 5914–5924, Dec. 2013.                           active office,’’ IEEE Pers. Commun., vol. 4, no. 5, pp. 42–47, Oct. 1997.
[177] M. Ocana, L. M. Bergasa, M. A. Sotelo, and R. Flores, ‘‘Indoor robot         [201] D. S. Mankowska, F. Meisel, and C. Bierwirth, ‘‘The home health care
      navigation using a POMDP based on WiFi and ultrasound observations,’’              routing and scheduling problem with interdependent services,’’ Health
      in Proc. IEEE/RSJ Int. Conf. Intell. Robots Syst., Edmonton, AB, Canada,           Care Manage. Sci., vol. 17, no. 1, pp. 15–30, Mar. 2014.
      Aug. 2005, pp. 2592–2597.                                                    [202] A. Trautsamwieser and P. Hirsch, ‘‘Optimization of daily scheduling for
[178] W. Guan, S. Chen, S. Wen, Z. Tan, H. Song, and W. Hou, ‘‘High-accuracy             home health care services,’’ J. Appl. Oper. Res., vol. 3, no. 3, pp. 124–136,
      robot indoor localization scheme based on robot operating system using             Jan. 2011.
      visible light positioning,’’ IEEE Photon. J., vol. 12, no. 2, pp. 1–16,      [203] Y. Shi, T. Boudouh, and O. Grunder, ‘‘A hybrid genetic algorithm for a
      Apr. 2020.                                                                         home health care routing problem with time window and fuzzy demand,’’
[179] J. Jin, X. Ma, and I. Kosonen, ‘‘An intelligent control system for traffic         Expert Syst. Appl., vol. 72, pp. 160–176, Apr. 2017.
      lights with simulation-based evaluation,’’ Control Eng. Pract., vol. 58,     [204] B. Yuan, R. Liu, and Z. Jiang, ‘‘Home health care crew scheduling and
      pp. 24–33, Jan. 2017.                                                              routing problem with stochastic service times,’’ in Proc. IEEE Int. Conf.
[180] R. States and E. Pappas, ‘‘Precision and repeatability of the Optotrak             Autom. Sci. Eng. (CASE), Taipei, Taiwan, Aug. 2014, pp. 564–569.
      3020 motion measurement system,’’ J. Med. Eng. Technol., vol. 30, no. 1,     [205] Y. Zhang, R. Su, K. Gao, and Y. Zhang, ‘‘A pedestrian hop-
      pp. 1–16, Jan. 2006.                                                               ping model and traffic light scheduling for pedestrian-vehicle mixed-
[181] T. Fujiwara, K. Murofushi, K. Yuasa, and H. Koshimizu, ‘‘Firefly cap-              flow networks,’’ May 2017, arXiv:1705.05251. [Online]. Available:
      turing method and its application to performance analysis of athlete,’’ in         http://arxiv.org/abs/1705.05251
      Proc. SICE Annu. Conf., Kagawa, Japan, Sep. 2007, pp. 295–298.               [206] Y. Zhang, K. Gao, Y. Zhang, and R. Su, ‘‘Traffic light scheduling for
[182] W. K. Wong, P. N. Tan, C. K. Loo, and W. S. Lim, ‘‘An effective                    pedestrian-vehicle mixed-flow networks,’’ IEEE Trans. Intell. Transp.
      surveillance system using thermal camera,’’ in Proc. Int. Conf. Signal             Syst., vol. 20, no. 4, pp. 1468–1483, Apr. 2019.
      Acquisition Process., Kuala Lumpur, Malaysia, Apr. 2009, pp. 13–17.          [207] A. Bentaleb, A. C. Begen, R. Zimmermann, and S. Harous, ‘‘SDNHAS:
[183] A. Torabi, G. Massé, and G.-A. Bilodeau, ‘‘An iterative integrated frame-          An SDN-enabled architecture to optimize QoE in HTTP adaptive stream-
      work for thermal–visible image registration, sensor fusion, and people             ing,’’ IEEE Trans. Multimedia, vol. 19, no. 10, pp. 2136–2151, Oct. 2017.
      tracking for video surveillance applications,’’ Comput. Vis. Image Under-    [208] W. Kang, S. Nam, Y. Han, and S. Lee, ‘‘Improved heading estimation
      stand., vol. 116, no. 2, pp. 210–221, Feb. 2012.                                   for smartphone-based indoor positioning systems,’’ in Proc. IEEE 23rd
[184] A. Szajewska, ‘‘Development of the thermal imaging camera (TIC) tech-              Int. Symp. Pers., Indoor Mobile Radio Commun. (PIMRC), Sydney, NSW,
      nology,’’ Procedia Eng., vol. 172, pp. 1067–1072, Jan. 2017.                       Australia, Sep. 2012, pp. 2449–2453.
[185] J. M. Lloyd, Thermal Imaging Systems. Berlin, Germany: Springer, 2013.       [209] B.-S. Cho, W.-S. Moon, W.-J. Seo, and K.-R. Baek, ‘‘A dead reckoning
[186] J. Johnson, S. Hasan, D. Lee, C. Hluchan, and N. Ahmed, Technical                  localization system for mobile robots using inertial sensors and wheel rev-
      Disclosure Commons. (Apr. 17, 2020). Social-Distancing Monitoring                  olution encoding,’’ J. Mech. Sci. Technol., vol. 25, no. 11, pp. 2907–2917,
      Using Portable Electronic Devices. Accessed: Apr. 29, 2020. [Online].              Nov. 2011.
      Available: https://www.tdcommons.org/dpubs_series/3158/
                                                                                   [210] Q. Fan, B. Sun, Y. Sun, Y. Wu, and X. Zhuang, ‘‘Data fusion for indoor
[187] W. Elloumi, A. Latoui, R. Canals, A. Chetouani, and S. Treuillet, ‘‘Indoor
                                                                                         mobile robot positioning based on tightly coupled INS/UWB,’’ J. Navi-
      pedestrian localization with a smartphone: A comparison of inertial and
                                                                                         gat., vol. 70, no. 5, pp. 1079–1097, Sep. 2017.
      vision-based methods,’’ IEEE Sensors J., vol. 16, no. 13, pp. 5376–5388,
                                                                                   [211] L. R. G. Carrillo, A. E. D. López, R. Lozano, and C. Pégard, ‘‘Combining
      Jul. 2016.
                                                                                         stereo vision and inertial navigation system for a quad-rotor UAV,’’
[188] J. Yan, G. He, and C. Hancock, ‘‘Low-cost vision-based positioning
                                                                                         J. Intell. Robotic Syst., vol. 65, nos. 1–4, pp. 373–387, Jan. 2012.
      system,’’ in Proc. 14th Int. Conf. Location Based Services, Zürich,
                                                                                   [212] T. Cheviron, T. Hamel, R. Mahony, and G. Baldwin, ‘‘Robust nonlinear
      Switzerland, Jan. 2018, pp. 44–49.
                                                                                         fusion of inertial and visual data for position, velocity and attitude esti-
[189] A. Poulose and D. S. Han, ‘‘Hybrid indoor localization using IMU sen-
                                                                                         mation of UAV,’’ in Proc. IEEE Int. Conf. Robot. Autom., Rome, Italy,
      sors and smartphone camera,’’ Sensors, vol. 19, no. 23, pp. 5084–5101,
                                                                                         Apr. 2007, pp. 2010–2016.
      Nov. 2019.
                                                                                   [213] J. Lim, H. Yu, K. Kim, M. Kim, and S.-B. Lee, ‘‘Preserving location
[190] A. H. Sayed, A. Tarighat, and N. Khajehnouri, ‘‘Network-based wireless
                                                                                         privacy of connected vehicles with highly accurate location updates,’’
      location: Challenges faced in developing techniques for accurate wire-
                                                                                         IEEE Commun. Lett., vol. 21, no. 3, pp. 540–543, Mar. 2017.
      less location information,’’ IEEE Signal Process. Mag., vol. 22, no. 4,
      pp. 24–40, Jul. 2005.                                                        [214] J. Cui, J. Wen, S. Han, and H. Zhong, ‘‘Efficient privacy-preserving
[191] I. Castillo, T. Joro, and Y. Y. Li, ‘‘Workforce scheduling with multiple           scheme for real-time location data in vehicular ad-hoc network,’’ IEEE
      objectives,’’ Eur. J. Oper. Res., vol. 196, no. 1, pp. 162–170, Jul. 2009.         Internet Things J., vol. 5, no. 5, pp. 3491–3498, Oct. 2018.
[192] V. Valls, Á. Pérez, and S. Quintanilla, ‘‘Skilled workforce scheduling       [215] C. Yin, J. Xi, R. Sun, and J. Wang, ‘‘Location privacy protection based on
      in service centres,’’ Eur. J. Oper. Res., vol. 193, no. 3, pp. 791–804,            differential privacy strategy for big data in industrial Internet of Things,’’
      Mar. 2009.                                                                         IEEE Trans. Ind. Informat., vol. 14, no. 8, pp. 3628–3636, Aug. 2018.
[193] M. Fırat and C. A. J. Hurkens, ‘‘An improved MIP-based approach for a        [216] Y. Jia, Y. Wang, X. Jin, and X. Cheng, ‘‘Location prediction: A temporal-
      multi-skill workforce scheduling problem,’’ J. Scheduling, vol. 15, no. 3,         spatial Bayesian model,’’ ACM Trans. Intell. Syst. Technol., vol. 7, no. 3,
      pp. 363–380, Jun. 2012.                                                            pp. 1–25, Apr. 2016.
[194] N. Balakrishnan and R. T. Wong, ‘‘A network model for the rotating           [217] S.-B. Cho, ‘‘Exploiting machine learning techniques for location recog-
      workforce scheduling problem,’’ Networks, vol. 20, no. 1, pp. 25–42,               nition and prediction with smartphone logs,’’ Neurocomputing, vol. 176,
      Jan. 1990.                                                                         pp. 98–106, Feb. 2016.
[195] G. C. Kaandorp and G. Koole, ‘‘Optimal outpatient appointment schedul-       [218] A. Brighente, F. Formaggio, G. M. Di Nunzio, and S. Tomasin, ‘‘Machine
      ing,’’ Health Care Manage. Sci., vol. 10, no. 3, pp. 217–229, Jun. 2007.           learning for in-region location verification in wireless networks,’’ IEEE
[196] B. Denton and D. Gupta, ‘‘A sequential bounding approach for optimal               J. Sel. Areas Commun., vol. 37, no. 11, pp. 2490–2502, Nov. 2019.
      appointment scheduling,’’ IIE Trans., vol. 35, no. 11, pp. 1003–1016,        [219] F. Yin, Z. Lin, Y. Xu, Q. Kong, D. Li, S. Theodoridis, and S. Cui, ‘‘Fed-
      Nov. 2003.                                                                         Loc: Federated learning framework for data-driven cooperative local-
[197] H.-Y. Mak, Y. Rong, and J. Zhang, ‘‘Appointment scheduling with limited            ization and location data processing,’’ Mar. 2020, arXiv:2003.03697.
      distributional information,’’ Manage. Sci., vol. 61, no. 2, pp. 316–334,           [Online]. Available: http://arxiv.org/abs/2003.03697
      Feb. 2015.                                                                   [220] M. Polese, R. Jana, V. Kounev, K. Zhang, S. Deb, and M. Zorzi, ‘‘Machine
[198] C. Zacharias and M. Pinedo, ‘‘Appointment scheduling with no-                      learning at the edge: A data-driven architecture with applications to 5G
      shows and overbooking,’’ Prod. Operations Manage., vol. 23, no. 5,                 cellular networks,’’ Apr. 2018, arXiv:1808.07647. [Online]. Available:
      pp. 788–801, May 2014.                                                             http://arxiv.org/abs/1808.07647
[199] S. A. Erdogan and B. Denton, ‘‘Dynamic appointment scheduling of a           [221] U. Challita, A. Ferdowsi, M. Chen, and W. Saad, ‘‘Machine learning for
      stochastic server with uncertain demand,’’ INFORMS J. Comput., vol. 25,            wireless connectivity and security of cellular-connected UAVs,’’ IEEE
      no. 1, pp. 116–132, Feb. 2013.                                                     Wireless Commun., vol. 26, no. 1, pp. 28–35, Feb. 2019.
[200] G. Hiermann, M. Prandtstetter, A. Rendl, J. Puchinger, and G. R. Raidl,      [222] F. A. Hossain, A. A. Lover, G. A. Corey, N. G. Reigh, and T. Rahman,
      ‘‘Metaheuristics for solving a multimodal home-healthcare schedul-                 ‘‘FluSense: A contactless syndromic surveillance platform for influenza-
      ing problem,’’ Central Eur. J. Oper. Res., vol. 23, no. 1, pp. 89–113,             like illness in hospital waiting areas,’’ ACM IMWUT, vol. 4, no. 1,
      Mar. 2015.                                                                         pp. 1–28, Mar. 2020.
[223] F. Tian, B. Liu, X. Sun, X. Zhang, G. Cao, and L. Gui, ‘‘Movement-based                             NGOC-TAN NGUYEN (Graduate Student
      incentive for crowdsourcing,’’ IEEE Trans. Veh. Technol., vol. 66, no. 8,                           Member, IEEE) received the B.Sc. degree in
      pp. 7223–7233, Aug. 2017.                                                                           mechatronics and the M.Sc. degree in electrical
[224] J.-X. Liu, Y.-D. Ji, W.-F. Lv, and K. Xu, ‘‘Budget-aware dynamic incen-                             engineering from the University of Engineering
      tive mechanism in spatial crowdsourcing,’’ J. Comput. Sci. Technol.,                                and Technology (UET), Vietnam National Univer-
      vol. 32, no. 5, pp. 890–904, Sep. 2017.                                                             sity (VNU), Hanoi, Vietnam, in 2011 and 2014,
[225] Z. Wang, J. Hu, Q. Wang, R. Lv, J. Wei, H. Chen, and X. Niu, ‘‘Task                                 respectively. He is currently pursuing the Ph.D.
      bundling based incentive for location-dependent mobile crowdsourcing,’’
                                                                                                          degree (dual doctoral program) with the University
      IEEE Commun. Mag., vol. 57, no. 3, pp. 132–137, Mar. 2019.
                                                                                                          of Technology Sydney (UTS) and VNU-UET.
[226] M. A. Rahman and M. S. Hossain, ‘‘A location-based mobile crowdsens-
      ing framework supporting a massive ad hoc social network environment,’’                             He was a Research and Development Staff at
      IEEE Commun. Mag., vol. 55, no. 3, pp. 76–85, Mar. 2017.                    Samsung Electronics Vietnam Company Ltd., from 2011 to 2013. He is
[227] S. Ankel, Business Insider. (May 10, 2020). Photos Show How                 also a Lecturer with Thang Long University. His main interests include
      the World is Readapting to Socially Distanced Life During the               wireless communications, visible light communications, energy harvesting,
      Coronavirus Pandemic, From Plastic Table Barriers to Taped-                 backscatter communications, and the IoT.
      Up Urinals. Accessed: Jun. 29, 2020. [Online]. Available:
      https://www.businessinsider.com/photos-show-world-adapting-to-
      social-distancing-guidelines-in-pandemic-2020-5
[228] Ministry of Housing, Communities & Local Government. (Jun. 26, 2020).
      Coronavirus (COVID-19): Safer Public Places—Urban Centres
      and Green Spaces. Accessed: Jun. 29, 2020. [Online]. Available:                                     TRAN VIET KHOA received the B.Sc. degree
      https://www.gov.uk/guidance/safer-public-places-urban-centres-and-                                  in electronics and telecommunications from the
      green-spaces-covid-19                                                                               University of Engineering and Technology (UET),
                                                                                                          Vietnam National University (VNU), in 2008,
                                                                                                          and the M.Sc. degree from Paris-Sud 11, France,
                                                                                                          in 2010. He is currently pursuing the Ph.D.
                         CONG T. NGUYEN received the B.E. degree
                                                                                                          degree with the Joint Technology and Innovation
                         in electrical engineering and information from
                                                                                                          Research Center between VNU and the University
                         the Frankfurt University of Applied Sciences,
                                                                                                          of Technology Sydney (UTS). He was a Network
                         in 2014, and the M.Sc. degree in global production
                                                                                                          Engineer at Viettel Network Corporation, from
                         engineering and management from the Technical
                                                                                  2012 to 2018. His research interests include the IoT, deep learning, and
                         University of Berlin, in 2016. He is currently pur-
                                                                                  cyberattack detection.
                         suing the Ph.D. degree with the UTS-HCMUT
                         Joint Technology and Innovation Research Centre
                         between the Ho Chi Minh City University of Tech-
                         nology and the University of Technology Sydney
(UTS). His research interests include operations research, blockchain tech-
nology, game theory, and optimizations.                                                                      BUI MINH TUAN received the B.Sc. and M.Sc.
                                                                                                             degrees from Le Quy Don Technical University,
                                                                                                             Hanoi, Vietnam, in 2008 and 2013, respectively.
                        YURIS MULYA SAPUTRA (Graduate Student                                                He is currently pursuing the Ph.D. degree with
                        Member, IEEE) received the B.E. degree in                                            the VNU-UTS Joint Technology and Innovation
                        telecommunication engineering from the Institut                                      Research Center between Vietnam National Uni-
                        Teknologi Bandung (ITB), Indonesia, in 2010, and                                     versity and the University of Technology Sydney.
                        the M.Sc. degree in electrical and information                                       He was a Researcher at The Military Institute of
                        engineering from the Seoul National University                                       Science and Technology. His major is electron-
                        of Science and Technology (SeoulTech), South                                         ics and communications. His research interests
                        Korea, in 2014. He is currently pursuing the Ph.D.        include the IoT, physical layer security, and computer vision.
                        degree with the University of Technology Sydney
                        (UTS), Australia, and a full-time Lecturer with
Universitas Gadjah Mada (UGM), Indonesia. He was a Researcher with the
Intelligent Systems Research Group, SeoulTech, from 2014 to 2015, and
an Application Software Developer with the Digital Appliance Division,
Samsung Electronics, Indonesia, from 2010 to 2012. His research interests                                  DIEP N. NGUYEN (Senior Member, IEEE)
include mobile computing, energy efficiency, and optimization problems for                                 received the M.E. degree in electrical and com-
wireless communication networks.                                                                           puter engineering from the University of Califor-
                                                                                                           nia at San Diego (UCSD) and the Ph.D. degree
                                                                                                           in electrical and computer engineering from The
                                                                                                           University of Arizona (UA). He was a DECRA
                        NGUYEN VAN HUYNH (Graduate Student                                                 Research Fellow with Macquarie University and
                        Member, IEEE) received the B.E. degree in elec-                                    a Member of Technical Staff with Broadcom,
                        tronics and telecommunications engineering from                                    CA, USA, ARCON Corporation, Boston, and con-
                        the Hanoi University of Science and Technol-                                       sulting the Federal Administration of Aviation,
                        ogy (HUST), Vietnam, in 2016. He is currently             on turning detection of UAVs and aircraft, and the U.S. Air Force Research
                        pursuing the Ph.D. degree with the University             Laboratory, on antijamming. He is currently a Faculty Member with the Fac-
                        of Technology Sydney (UTS), Australia. From               ulty of Engineering and Information Technology, University of Technology
                        2017 to 2018, he was a Researcher with Nanyang            Sydney (UTS). His recent research interests include computer networking,
                        Technological University (NTU), Singapore. His            wireless communications, and machine learning application, with an empha-
                        research interests include wireless-powered com-          sis on systems’ performance and security/privacy. He received several awards
munications, green communications, and applications of machine learning           from LG Electronics, UCSD, The University of Arizona, the U.S. National
in wireless communications.                                                       Science Foundation, and the Australian Research Council.
                        DINH THAI HOANG (Member, IEEE) received                                              SYMEON CHATZINOTAS (Senior Member,
                        the Ph.D. degree in computer science and engi-                                       IEEE) received the M.Eng. degree in telecommu-
                        neering from Nanyang Technological University,                                       nications from the Aristotle University of Thes-
                        Singapore, in 2016. He is currently a Faculty                                        saloniki, Thessaloniki, Greece, in 2003, and the
                        Member at the School of Electrical and Data                                          M.Sc. and Ph.D. degrees in electronic engineer-
                        Engineering, University of Technology Sydney,                                        ing from the University of Surrey, Surrey, U.K.,
                        Australia. His research interests include emerging                                   in 2006 and 2009, respectively. He has been a
                        topics in wireless communications and network-                                       Visiting Professor at the University of Parma,
                        ing, such as ambient backscatter communications,                                     Italy. He was involved in numerous research and
                        vehicular communications, cybersecurity, the IoT,                                    development projects for the National Center for
and 5G networks. He is an Exemplary Reviewer of the IEEE TRANSACTIONS             Scientific Research Demokritos, the Center of Research and Technology
ON COMMUNICATIONS, in 2018, and the IEEE TRANSACTIONS ON WIRELESS                 Hellas, and the Center of Communication Systems Research, University of
COMMUNICATIONS, in 2017 and 2018. He is currently an Editor of the IEEE           Surrey. He is currently a Full Professor/Chief Scientist I and the Co-Head of
WIRELESS COMMUNICATIONS LETTERS and the IEEE TRANSACTIONS ON COGNITIVE            the SIGCOM Research Group at SnT, University of Luxembourg. He has
COMMUNICATIONS AND NETWORKING.                                                    (co-)authored more than 400 technical articles in refereed international
                                                                                  journals, conferences, and scientific books. He was a co-recipient of the
                                                                                  2014 IEEE Distinguished Contributions to Satellite Communications Award,
                                                                                  the CROWNCOM 2015 Best Paper Award, and the 2018 EURASIC JWCN
                                                                                  Best Paper Award. He is currently in the Editorial Board of the IEEE
                           THANG X. VU (Member, IEEE) was born in Hai
                                                                                  OPEN JOURNAL OF VEHICULAR TECHNOLOGY and the INTERNATIONAL JOURNAL OF
                           Duong, Vietnam. He received the B.S. and M.Sc.
                                                                                  SATELLITE COMMUNICATIONS AND NETWORKING.
                           degrees in electronics and telecommunications
                           engineering from the VNU University of Engi-
                           neering and Technology, Vietnam, in 2007 and
                           2009, respectively, and the Ph.D. degree in electri-
                           cal engineering from University Paris-Sud, France,
                                                                                                             BJÖRN OTTERSTEN (Fellow, IEEE) was born
                           in 2014.
                                                                                                             in Stockholm, Sweden, in 1961. He received the
                              In 2010, he received the Allocation de
                                                                                                             M.S. degree in electrical engineering and applied
                           Recherche Fellowship to study Ph.D. degree in
                                                                                                             physics from Linköping University, Linköping,
France. From September 2010 to May 2014, he was with the Laboratory of
                                                                                                             Sweden, in 1986, and the Ph.D. degree in electrical
Signals and Systems (LSS), a joint laboratory of CNRS, CentraleSupelec,
                                                                                                             engineering from Stanford University, Stanford,
and University Paris-Sud XI, France. From July 2014 to January 2016,
                                                                                                             CA, USA, in 1990.
he was a Postdoctoral Researcher with the Information Systems Technology
                                                                                                                He has held research positions with the Depart-
and Design (ISTD) Pillar, Singapore University of Technology and Design
                                                                                                             ment of Electrical Engineering, Linköping Univer-
(SUTD), Singapore. He is currently a Research Associate at the Interdis-
                                                                                                             sity, the Information Systems Laboratory, Stanford
ciplinary Centre for Security, Reliability and Trust (SnT), University of
                                                                                  University, the Katholieke Universiteit Leuven, Leuven, Belgium, and the
Luxembourg. His research interests include wireless communications, with
                                                                                  University of Luxembourg, Luxembourg. From 1996 to 1997, he was the
particular interests of wireless edge caching, cloud radio access networks,
                                                                                  Director of Research with ArrayComm, Inc., a start-up in San Jose, CA,
machine learning for communications, and cross-layer resources optimiza-
                                                                                  USA, based on his patented technology. In 1991, he was appointed as a
tion. He was a recipient of the SigTelCom 2019 Best Paper Award.
                                                                                  Professor of signal processing with the Royal Institute of Technology (KTH),
                                                                                  Stockholm. From 1992 to 2004, he was the Head of the Department for Sig-
                                                                                  nals, Sensors, and Systems, KTH, and from 2004 to 2008, he was the Dean
                                                                                  of the School of Electrical Engineering, KTH. He is currently the Director
                         ERYK DUTKIEWICZ (Senior Member, IEEE)                    for the Interdisciplinary Centre for Security, Reliability and Trust, University
                         received the B.E. degree in electrical and elec-         of Luxembourg. He is a Fellow of the EURASIP. He was a recipient of the
                         tronic engineering and the M.Sc. degree in applied       IEEE Signal Processing Society Technical Achievement Award, in 2011, and
                         mathematics from The University of Adelaide,             the European Research Council advanced research grant twice, from 2009 to
                         in 1988 and 1992, respectively, and the Ph.D.            2013 and from 2017 to 2022. He has coauthored journal articles that received
                         degree in telecommunications from the University         the IEEE Signal Processing Society Best Paper Award, in 1993, 2001, 2006,
                         of Wollongong, in 1996. His industry experience          and 2013, and the seven IEEE conference best paper awards. He has served as
                         includes the management of the Wireless Research         an Associate Editor for the IEEE TRANSACTIONS ON SIGNAL PROCESSING and in
                         Laboratory, Motorola, in 2000. He is currently           the Editorial Board of the IEEE Signal Processing Magazine. He is currently
                         the Head of the School of Electrical and Data            a member of the editorial boards of the EURASIP Signal Processing Journal,
Engineering, University of Technology Sydney, Australia. He also holds a          the EURASIP Journal of Advances Signal Processing, and Foundations and
professorial appointment at Hokkaido University, Japan. His current research      Trends of Signal Processing.
interests include 5G/6G and the Internet-of-Things networks.