2015
DOI: 10.1002/dac.2930
|View full text |Cite
|
Sign up to set email alerts
|

A scheme of access service recommendation for the Social Internet of Things

Abstract: The rapid increase in the complexity and the extent of personalization of services in the Internet of Things (IoT) has led to a greater demand for frequent collaboration among heterogeneous devices. Moreover, with the inseparable relations between human and devices, the paradigm of Social IoT (SIoT) is gaining popularity in recent years. How to effectively facilitate the access to quality services and credible devices in largescale networks via defining, establishing, and managing social architectures among th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
42
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 84 publications
(42 citation statements)
references
References 23 publications
0
42
0
Order By: Relevance
“…Distributed hash table are used for enhancing resiliency and scalability. [7] an access service recommendation scheme for efficient service composition and malicious attacks resistance in SIoT environments is proposed. To address issues in trustworthiness evaluation of SIoT services/devices including vulnerability, dynamic behavior, and resource restriction, they present a recommendation metric which integrated the timeliness properties of transactions and the social relationships between devices into the evaluation of access service in dynamic environment.…”
Section: Overviewmentioning
confidence: 99%
“…Distributed hash table are used for enhancing resiliency and scalability. [7] an access service recommendation scheme for efficient service composition and malicious attacks resistance in SIoT environments is proposed. To address issues in trustworthiness evaluation of SIoT services/devices including vulnerability, dynamic behavior, and resource restriction, they present a recommendation metric which integrated the timeliness properties of transactions and the social relationships between devices into the evaluation of access service in dynamic environment.…”
Section: Overviewmentioning
confidence: 99%
“…Link selection and service search are the backbone of social networks. Numerous researchers presented their work [49], and people are still working on this idea to make more greedy methods for the selection of links. There are many heuristic-based algorithms that have already been proposed [14].…”
Section: Open Discussion Challenges In and Future Research Directiomentioning
confidence: 99%
“…In a P2P overlay network, two types of model normally exist, including subjective-and objective-based trust models [49]. The P2P systems discussed by Sawamura, Aikebaier [49] are comprised of peer processes. Moreover, during communications, each peer can by itself obtain information regarding objects.…”
Section: The Service Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Others research papers are oriented towards specific applications, such as those presented in [15] [16]. There are also projects focusing on security issues 0 or even on the development of relationship between objects similar to human interaction [17] [18].…”
Section: Related Workmentioning
confidence: 99%