...In this regard, technologies such as ubiquitous computing (Burrell et al., 2004), wireless ad-hoc and sensor networks (Diallo et al., 2015; Srbinovska et al., 2015; Zhao et al., 2013; Karim et al., 2013; Zhang et al., 2013; Krishna et al., 2012; Zhang and Zhang, 2012; Misra et al., 2011; Mirabella and Brischetto, 2011; Lloret et al., 2011; Garcia et al., 2010; Bri et al., 2009; Lloret et al., 2009; Lin et al., 2008; Wang et al., 2006), Radio Frequency Identifier (RFID) (Ruiz-Garcia and Lunadei, 2011), cloud computing (Ojha et al., 2014; Misra et al., 2014; Cho et al., 2012), Internet of Things (IoT) (Atzori et al., 2010; Gubbi et al., 2013), satellite monitoring (Moghaddam et al., 2010), remote sensing (Bastiaanssen et al., 2000;Morais et al., 2008; Ye et al., 2013), context-aware computing (Moghaddam et al., 2010) are becoming increasingly popular....