Visible to the public Trustworthiness Management in the Social Internet of Things

TitleTrustworthiness Management in the Social Internet of Things
Publication TypeJournal Article
Year of Publication2014
AuthorsNitti, M., Girau, R., Atzori, L.
JournalKnowledge and Data Engineering, IEEE Transactions on
Volume26
Pagination1253-1266
Date PublishedMay
ISSN1041-4347
KeywordsAnalytical models, Communication/Networking and Information Technology, Computational modeling, Computer Systems Organization, distributed hash table structure, Distributed Systems, feedback exchange, General, information/service discovery, Internet, Internet of Things, network scalability, network traffic, P2P networks, Peer-to-peer computing, reliability, reliable system, social Internet of Things, social IoT, Social network services, social networking (online), social networking concepts, social networks, Trusted Computing, trustworthiness management
Abstract

The integration of social networking concepts into the Internet of things has led to the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way with respect to their owners with the benefits of improving the network scalability in information/service discovery. Within this scenario, we focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects. We define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. In the subjective model each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the friends in common with the potential service providers. In the objective model, the information about each node is distributed and stored making use of a distributed hash table structure so that any node can make use of the same information. Simulations show how the proposed models can effectively isolate almost any malicious nodes in the network at the expenses of an increase in the network traffic for feedback exchange.

URLhttps://ieeexplore.ieee.org/document/6547148
DOI10.1109/TKDE.2013.105
Citation Key6547148