Trustworthiness Management in the Social Internet of Things
Title | Trustworthiness Management in the Social Internet of Things |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Nitti, M., Girau, R., Atzori, L. |
Journal | Knowledge and Data Engineering, IEEE Transactions on |
Volume | 26 |
Pagination | 1253-1266 |
Date Published | May |
ISSN | 1041-4347 |
Keywords | Analytical models, Communication/Networking and Information Technology, Computational modeling, Computer Systems Organization, distributed hash table structure, Distributed Systems, feedback exchange, General, information/service discovery, Internet, Internet of Things, network scalability, network traffic, P2P networks, Peer-to-peer computing, reliability, reliable system, social Internet of Things, social IoT, Social network services, social networking (online), social networking concepts, social networks, Trusted Computing, trustworthiness management |
Abstract | The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their owners with the benefits of improving the network scalability in information/service discovery. Within this scenario, we focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects. We define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. In the subjective model each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the friends in common with the potential service providers. In the objective model, the information about each node is distributed and stored making use of a distributed hash table structure so that any node can make use of the same information. Simulations show how the proposed models can effectively isolate almost any malicious nodes in the network at the expenses of an increase in the network traffic for feedback exchange. |
URL | https://ieeexplore.ieee.org/document/6547148 |
DOI | 10.1109/TKDE.2013.105 |
Citation Key | 6547148 |
- network traffic
- trustworthiness management
- Trusted Computing
- social networks
- social networking concepts
- social networking (online)
- Social network services
- social IoT
- Social Internet of Things
- reliable system
- Reliability
- Peer-to-peer computing
- P2P networks
- Analytical models
- network scalability
- Internet of Things
- internet
- information/service discovery
- General
- feedback exchange
- distributed systems
- distributed hash table structure
- Computer Systems Organization
- Computational modeling
- Communication/Networking and Information Technology