scholarly journals Design and Implementation of a Trust Information Management Platform for Social Internet of Things Environments

Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4707 ◽  
Author(s):  
Um ◽  
Lee ◽  
Lee ◽  
Yoon

As the vast amount of data in social Internet of Things (IoT) environments considering interactions between IoT and people is accumulated and processed through cloud and big data technologies, the services that utilize them are applied in various fields. The trust between IoT devices and their data is recognized as the core of IoT ecosystem creation and growth. Connection with suspicious IoT devices may pose a risk to services and system operation. Therefore, it is essential to analyze and manage trust information for devices, services, and people, as well as to provide the trust information to the other devices or users that need it. This paper presents a trust information management framework which contains a generic IoT reference model with trust capabilities to achieve the goal of converged trust information management. Additionally, a trust information management platform (TIMP) consisting of trust agents, trust information brokers, and trust information management systems has been proposed, which aims to provide trustworthy and safe interactions among people, virtual objects, and physical things. Implementing and deploying a TIMP enables a trustworthy ecosystem to be built while activating social IoT businesses by reducing transaction costs, as well as by eliminating the uncertainties in the use of social IoT services and data transactions.

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Xiaofeng Wu ◽  
Fangyuan Ren ◽  
Yiming Li ◽  
Zhenwei Chen ◽  
Xiaoling Tao

With the rapid development of the Internet of Things (IoT) technology, it has been widely used in various fields. IoT device as an information collection unit can be built into an information management system with an information processing and storage unit composed of multiple servers. However, a large amount of sensitive data contained in IoT devices is transmitted in the system under the actual wireless network environment will cause a series of security issues and will become inefficient in the scenario where a large number of devices are concurrently accessed. If each device is individually authenticated, the authentication overhead is huge, and the network burden is excessive. Aiming at these problems, we propose a protocol that is efficient authentication for Internet of Things devices in information management systems. In the proposed scheme, aggregated certificateless signcryption is used to complete mutual authentication and encrypted transmission of data, and a cloud server is introduced to ensure service continuity and stability. This scheme is suitable for scenarios where large-scale IoT terminal devices are simultaneously connected to the information management system. It not only reduces the authentication overhead but also ensures the user privacy and data integrity. Through the experimental results and security analysis, it is indicated that the proposed scheme is suitable for information management systems.


Author(s):  
Jan Aalmink ◽  
Jorge Marx Gómez

Cloud Computing is finding its way into the architecture of current IT landscapes. The present chapter depicts the challenges of the required changes and transitions of Enterprise Data Centers from non-integrated on-premise solutions towards fully integrated on-demand systems in silo-free clouds. Cloud standardization in the context of the Open Cloud Manifesto is discussed as well as a reference model based upon semantic composition and federation (Federated ERP Systems and Corporate Environmental Information Management Systems CEMIS 2.0). How Enterprise Tomography can support the governance process is described as the Root-Cause-Analysis procedure and Integration Lifecycle Management of an Enterprise Cloud and by comparing different system states. On the basis of an operator-based approach, Root-Cause-Analysis and data integrity can be ensured. Finally, an outlook on an approach involving environmental aspects (Green Clouds) is given.


2020 ◽  
Vol 16 (4) ◽  
pp. 155014772090877 ◽  
Author(s):  
Juyeon Son ◽  
Wonyoung Choi ◽  
Sang-Min Choi

Social Internet of things is one of the most up-to-date research issues in the applications of Internet of things technologies. In social Internet of things, accuracy and reliability are standard features to discerning decisions. We assume that decision support systems based on social Internet of things could leverage research from recommender systems to achieve more stable performance. Therefore, we propose a trust-aware recommender systems suitable for social Internet of things. Trust-aware recommender systems adapt the concept of social networking service and utilize social interaction information. Trust information not only improves recommender systems from opinion spam problems but also more accurately predicts users’ preferences. We confirm that the performance of a recommender system becomes more improved when implicit trust is able to satisfy the properties of trust in the social Internet of things environment. The structure and amount of social link information are context-sensitive, so applying the concept of trust into social Internet of things environments requires a method to optimize implicit and explicit trust with minimal social link information. Our proposed method configures an asymmetric implicit trust network utilizing user–item rating matrix and transforms trust propagation metrics for a directional and weighted trust network. Through experiments, we confirm that the proposed methods enable higher accuracy and wider coverage compared to the existing recommendation methods.


Sensors ◽  
2021 ◽  
Vol 21 (2) ◽  
pp. 462
Author(s):  
Kyoungsoo Bok ◽  
Yeondong Kim ◽  
Dojin Choi ◽  
Jaesoo Yoo

As various types of data are generated on the social Internet of things (SIoT), which combine the Internet of things (IoT) and social networks, the relations of IoT devices should be established for necessary data exchange. In this paper, we propose a user recommendation scheme that facilitates data sharing through an analysis of an interaction between an IoT device and a user in the SIoT. An interrelation between a user and an IoT device as well as an interrelation between users exist simultaneously in the SIoT. Hence, the interaction between users must be analyzed to identify the interest keywords, and the interaction between IoT devices and users to determine the user’s preference of IoT device. Moreover, the proposed scheme calculates the similarity between users based on the IoT device preference based on IoT device usage frequency and interest keywords, which are identified through an analysis between the user and IoT device and that between users. Subsequently, it recommends top-N users who have a high similarity as the users for data sharing. Furthermore, the performance of the proposed scheme is verified through performance evaluation based on the precision, recall, and F-measure.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Longxing Chen ◽  
Ping Han

Aiming at the current situation of complicated energy-consuming equipment and large energy consumption in the current enterprise, a reference model scheme of an enterprise energy efficiency management platform based on the Internet of Things is analyzed and the dynamically collected energy consumption information is analyzed using the Internet of Things technology and data mining technology. They provide decision-making support for enterprise energy efficiency management decisions and formulation of energy-saving and emission reduction plans. This article analyzes the current status of energy efficiency management in buildings and points out several pain points in energy efficiency management, including installation difficulties, high software development costs, upgrade difficulties, long debugging cycles, and closed systems, and introduces intelligent power distribution monitoring based on the Internet of Things technology to solve these difficulties. In the system, we analyze the actual value brought by energy efficiency management technology through case studies. It can collect scattered information through the Internet of Things, gather it together to form massive data, and obtain the corresponding information through data analysis and processing. The design is reasonable, the practicality is strong, the use effect is good, and it is easy to promote and use.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Sign in / Sign up

Export Citation Format

Share Document