scholarly journals Trust information network in social Internet of things using trust-aware recommender systems

2020 ◽  
Vol 16 (4) ◽  
pp. 155014772090877 ◽  
Author(s):  
Juyeon Son ◽  
Wonyoung Choi ◽  
Sang-Min Choi

Social Internet of things is one of the most up-to-date research issues in the applications of Internet of things technologies. In social Internet of things, accuracy and reliability are standard features to discerning decisions. We assume that decision support systems based on social Internet of things could leverage research from recommender systems to achieve more stable performance. Therefore, we propose a trust-aware recommender systems suitable for social Internet of things. Trust-aware recommender systems adapt the concept of social networking service and utilize social interaction information. Trust information not only improves recommender systems from opinion spam problems but also more accurately predicts users’ preferences. We confirm that the performance of a recommender system becomes more improved when implicit trust is able to satisfy the properties of trust in the social Internet of things environment. The structure and amount of social link information are context-sensitive, so applying the concept of trust into social Internet of things environments requires a method to optimize implicit and explicit trust with minimal social link information. Our proposed method configures an asymmetric implicit trust network utilizing user–item rating matrix and transforms trust propagation metrics for a directional and weighted trust network. Through experiments, we confirm that the proposed methods enable higher accuracy and wider coverage compared to the existing recommendation methods.

Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4707 ◽  
Author(s):  
Um ◽  
Lee ◽  
Lee ◽  
Yoon

As the vast amount of data in social Internet of Things (IoT) environments considering interactions between IoT and people is accumulated and processed through cloud and big data technologies, the services that utilize them are applied in various fields. The trust between IoT devices and their data is recognized as the core of IoT ecosystem creation and growth. Connection with suspicious IoT devices may pose a risk to services and system operation. Therefore, it is essential to analyze and manage trust information for devices, services, and people, as well as to provide the trust information to the other devices or users that need it. This paper presents a trust information management framework which contains a generic IoT reference model with trust capabilities to achieve the goal of converged trust information management. Additionally, a trust information management platform (TIMP) consisting of trust agents, trust information brokers, and trust information management systems has been proposed, which aims to provide trustworthy and safe interactions among people, virtual objects, and physical things. Implementing and deploying a TIMP enables a trustworthy ecosystem to be built while activating social IoT businesses by reducing transaction costs, as well as by eliminating the uncertainties in the use of social IoT services and data transactions.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Sungwook Kim

Social Internet of Things (SIoT) is a control paradigm by the integration of social networking concepts into the Internet of Things, and Fog Computing (FC) is an emerging technology that is aimed at moving the cloud computing facilities to the access network. Recently, the SIoT and FC models are combined by using complementary features, and a new Social Fog IoT (SFIoT) paradigm has been developed. In this paper, we design novel resource allocation algorithms for the SFIoT system. Considering the social relationship and each preference, mobile devices in the SFIoT effectively share the limited computation and communication resources of FC operators. To formulate the interaction among mobile devices and FC operator, we adopt the basic concept of two game models: voting and bargaining games. Bicooperative voting approach can make control decisions for the resource allocation method, and Nash bargaining solution is used to effectively distribute the computation resource to different application tasks. Based on the two-phase game model, the proposed scheme takes various benefits in a fair-efficient way. Through the extensive simulation experiments, we can validate the superiority of our proposed approach by the fact that it produces a mutually acceptable agreement among game players and significantly outperforms the existing protocols. Last, we point out the further challenges and future research issues about the SFIoT paradigm opportunities.


Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 676 ◽  
Author(s):  
Jonathan Silva ◽  
Joel Rodrigues ◽  
Jalal Al-Muhtadi ◽  
Ricardo Rabêlo ◽  
Vasco Furtado

Internet of Things (IoT) management systems require scalability, standardized communication, and context-awareness to achieve the management of connected devices with security and accuracy in real environments. Interoperability and heterogeneity between hardware and application layers are also critical issues. To attend to the network requirements and different functionalities, a dynamic and context-sensitive configuration management system is required. Thus, reference architectures (RAs) represent a basic architecture and the definition of key characteristics for the construction of IoT environments. Therefore, choosing the best technologies of the IoT management platforms and protocols through comparison and evaluation is a hard task, since they are difficult to compare due to their lack of standardization. However, in the literature, there are no management platforms focused on addressing all IoT issues. For this purpose, this paper surveys the available policies and solutions for IoT Network Management and devices. Among the available technologies, an evaluation was performed using features such as heterogeneity, scalability, supported technologies, and security. Based on this evaluation, the most promising technologies were chosen for a detailed performance evaluation study (through simulation and deployment in real environments). In terms of contributions, these protocols and platforms were studied in detail, the main features of each approach are highlighted and discussed, open research issues are identified as well as the lessons learned on the topic.


Author(s):  
Wazir Zada Khan ◽  
Qurat-ul-Ain Arshad ◽  
Saqib Hakak ◽  
Muhammad Khurram Khan ◽  
Saeed-Ur-Rehman

2016 ◽  
Vol 43 (1) ◽  
pp. 135-144 ◽  
Author(s):  
Mehdi Hosseinzadeh Aghdam ◽  
Morteza Analoui ◽  
Peyman Kabiri

Recommender systems have been widely used for predicting unknown ratings. Collaborative filtering as a recommendation technique uses known ratings for predicting user preferences in the item selection. However, current collaborative filtering methods cannot distinguish malicious users from unknown users. Also, they have serious drawbacks in generating ratings for cold-start users. Trust networks among recommender systems have been proved beneficial to improve the quality and number of predictions. This paper proposes an improved trust-aware recommender system that uses resistive circuits for trust inference. This method uses trust information to produce personalized recommendations. The result of evaluating the proposed method on Epinions dataset shows that this method can significantly improve the accuracy of recommender systems while not reducing the coverage of recommender systems.


Sensors ◽  
2021 ◽  
Vol 21 (5) ◽  
pp. 1598
Author(s):  
Sigurd Frej Joel Jørgensen Ankergård ◽  
Edlira Dushku ◽  
Nicola Dragoni

The Internet of Things (IoT) ecosystem comprises billions of heterogeneous Internet-connected devices which are revolutionizing many domains, such as healthcare, transportation, smart cities, to mention only a few. Along with the unprecedented new opportunities, the IoT revolution is creating an enormous attack surface for potential sophisticated cyber attacks. In this context, Remote Attestation (RA) has gained wide interest as an important security technique to remotely detect adversarial presence and assure the legitimate state of an IoT device. While many RA approaches proposed in the literature make different assumptions regarding the architecture of IoT devices and adversary capabilities, most typical RA schemes rely on minimal Root of Trust by leveraging hardware that guarantees code and memory isolation. However, the presence of a specialized hardware is not always a realistic assumption, for instance, in the context of legacy IoT devices and resource-constrained IoT devices. In this paper, we survey and analyze existing software-based RA schemes (i.e., RA schemes not relying on specialized hardware components) through the lens of IoT. In particular, we provide a comprehensive overview of their design characteristics and security capabilities, analyzing their advantages and disadvantages. Finally, we discuss the opportunities that these RA schemes bring in attesting legacy and resource-constrained IoT devices, along with open research issues.


Sign in / Sign up

Export Citation Format

Share Document