Towards Trust and Friendliness Approaches in the Social Internet of Things
Total Page:16
File Type:pdf, Size:1020Kb
applied sciences Review Towards Trust and Friendliness Approaches in the Social Internet of Things Farhan Amin 1 , Awais Ahmad 2 and Gyu Sang Choi 1,* 1 Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 280, Korea; [email protected] 2 Department of Computer Science, Bahria University, Islamabad 44000, Pakistan; [email protected] * Correspondence: [email protected] Received: 27 November 2018; Accepted: 21 December 2018; Published: 4 January 2019 Abstract: The Internet of Things (IoT) is an interconnected network of heterogeneous entities, such as sensors and embedded devices. During the current era, a new field of research has emerged, referred to as the social IoT, which mainly includes social networking features. The social IoT refers to devices that are capable of creating interactions with each other to independently achieve a common goal. Based on the structure, the support of numerous applications, and networking services, the social IoT is preferred over the traditional IoT. However, aspects like the roles of users and network navigability are major challenges that provoke users’ fears of data disclosure and privacy violations. Thus, it is important to provide reliable data analyses by using trust- and friendliness-based properties. This study was designed because of the limited availability of information in this area. It is a classified catalog of trust- and friendliness-based approaches in the social IoT with important highlights of important constraints, such as scalability, adaptability, and suitable network structures (for instance, human-to-human and human-to-object). In addition, typical concerns like communities of interest and social contacts are discussed in detail, with particular emphasis on friendliness- and trust-based properties, such as service composition, social similarity, and integrated cloud services. Keywords: Internet of Things; trust; social Internet of Things; trust management 1. Introduction One of the most important areas of the future Internet is the Internet of Things (IoT). Generally, physical objects are connected to the Internet using sensors and actuators because they effectively expedite technology advancements in the IoT by providing a number of services [1]. In the IoT, linking various objects is referred to as object–object interconnection. More recently, virtual objects (VOs) stand in for real-world entities as their digital counterparts [2]. They are extensively used in the IoT as a bridge to connect the physical world by providing a digital depiction of data, and they have interesting features that shape real-world objects, including the interactions of users with systems in the IoT [2]. Projects like SENSEI [3], Future Internet (FIWARE) [4], the Collaborative Open Market to Place Objects at your Service (COMPOSE) [5], and Internet of Things-Architecture (IoT-A) [6] are typical examples. In Figure1, cars represent an automobile manufacturing company. Real objects are represented by cars and bikes, and the term virtual object, represents a relationship. Each virtual object is associated with a single car or a number of cars [4]. When a customer needs to buy a car, the virtual object could be used to register the car with an insurance company or to obtain remote maintenance from an automobile manufacturing database. Here, we can perceive a virtual object as being created with more than one association. In addition, if a customer is registered with a single virtual object that can handle Appl. Sci. 2019, 9, 166; doi:10.3390/app9010166 www.mdpi.com/journal/applsci Appl. Sci. 2019, 9, x 166 FOR PEER REVIEW 22 of of 25 with more than one association. In addition, if a customer is registered with a single virtual object thatdifferent can handle types of different services types offered of byservices an automobile offered by manufacturing an automobile company, manufacturing such as company, car insurance such asand car smart insurance meters, and the smart concept meters, of the the many-to-many concept of the association many-to-many appears. association appears. Figure 1. VirtualVirtual objects interacting in the Internet of Things (IoT). In thethe IoT,IoT, data data collection collection and and scalability scalability are are major majo concernsr concerns [5]. First[5]. First of all, of data all, collectiondata collection by using by VOsusing is VOs a fairly is a challenging fairly challenging task. In task. the real In world,the real the world, IoT-based the IoT-based infrastructure infrastructure has hundreds has ofhundreds millions of devicesmillions thatof devices can connect that can to each connect other to over each the other Internet, over the which Internet, makes which things makes quite complicated.things quite Tocomplicated. encompass To humans encompass in this humans context isin a reasonablethis context means is a toreasonable overcoming means the complexity,to overcoming because the complexity,data collection because and monitoring data collection via the and IoT monitoring is identical vi toa athe human’s IoT is identical social life. to Once a human’s data collection social life. is Oncecompleted data aftercollection processing, is completed analysis, after and processi mining,ng, the analysis, acquired and data mining can provide, the acquired diverse intelligent data can provideservices. However,diverse intelligent from the perspectiveservices. However, of scalability, from it hasthe beenperspective observed of that scalability, IoT search it engines has been are observednot scalable that with IoT search respect engines to the number are not scalable of devices with [7 ],respect and hence, to the cannotnumber handle of devices a huge [7], and number hence, of cannotreceived handle queries. a Inhuge the IoT,number there of exists received the possibility queries. ofIn fake the objects,IoT, there such exists as people the possibility who cannot of get fake the objects,right services, such as and people objects who may cannot work get as the malware, right se hackingrvices, and data objects from other may objects.work as The malware, attacker hacking nodes datain that from network other objects. include The smart attacker dust andnodes fake in that particles network that include can steal smart secure dust information and fake particles concerning that canmilitary steal situationssecure information (e.g., at the concerni borderng of military a country) situations [7]. In order (e.g., toat avoidthe border such problems,of a country) the [7]. social In orderInternet to ofavoid Things such proposes problems, the integration the social ofInternet social networking of Things andproposes the IoT. the integration of social networkingIn the social and the IoT, IoT. objects can make any number of friends (other objects) as factual objects to get the rightIn the services. social IoT, This objects advantage can make makes any the number social IoT of friends superior (other to the objects) IoT. The as relationshipfactual objects between to get thefriends right and services. friends This of friends advantage is established makes the using social a IoT relationship superior query.to the IoT. Here, The relations relationship among between diverse peoplefriends and are developedfriends of friends that are is established truly based using on their a relationship social interests, query. real-life Here, relations relations, among similarity diverse of peoplebackground, are developed etc. Finally, that asare explained truly based by Militanoon their so [8cial], the interests, social IoT real-life offers relations, efficient andsimilarity scalable of background,discovery of objectsetc. Finally, and services as explained by using by humanMilitano social [8], networkthe social principles. IoT offers Additionally, efficient and the scalable social discoveryIoT not only of objects provides and a facilityservices towards by using better human network social navigation,network principles. but it is Additionally, also useful in the a finding social variousIoT not only tasks. provides Thus, an a objectfacility can towards correctly better discover networ variousk navigation, services, but and it is can also effectively useful in performa finding a variousnumber tasks. of tasks, Thus, the an same object as acan human correctly can [9discov]. Theseer various tasks are services, performed and basedcan effectively on the specific perform trust a numberlevel between of tasks, people, the same or sometimes, as a human friends. can [9]. Hence, These the tasks trust are level performed among the based devices on the can specific be increased trust levelexponentially between when people, friends or sometimes, (IoT devices) friends. interact He withnce, each the other. trust This level phenomenon among the was devices discussed can be by increasedRabadiya, exponentially Makwana [7] andwhen Atzori, friends Iera (IoT [10 devices)], among interact others, with in earlier each studies. other. This phenomenon was discussedThe purpose by Rabadiya, of this Makwana study is to [7] address and Atzori, the above-stated Iera [10], among problems others, by classifying in earlier studies. friendliness- and trust-basedThe purpose approaches of this in study the social is to IoT.address Trust the among above-stated peers in theproblems IoT and by friendliness classifying usingfriendliness- service anddiscovery trust-based have been approaches widely investigatedin the social in IoT. the Tr past.ust However,among peers this in is athe recent IoT trendand friendliness