84 research outputs found

    Implementation of an experimental platform for the social internet of things

    Get PDF
    The convergence of the Internet of Things (IoT) technologies with the social networking concepts has led to a new paradigm called the Social Internet of Things (SIoT), where the objects mimic the human behavior and create their own relationships based on the rules set by their owner. This is aimed at simplifying the complexity in handling the communications between billions of objects to the benefits of the humans. Whereas several IoT platforms are already available, the SIoT paradigm has represented only a field for pure research and simulations, until now. The aim of this paper is to present our implementation of a SIoT platform. We begin by analyzing the major IoT implementations, pointing out their common characteristics that could be re-used for our goal. We then discuss the major extensions we had to introduce on the existing platforms to introduce the functionalities of the SIoT. We also present the major functionalities of the proposed system: how to register a new social object to the platform, how the system manages the creation of new relationships, and how the devices create groups of members with similar characteristics. We conclude with the description of possible simple application scenarios

    A Binary Trust Game for the Internet of Things

    Get PDF
    The IoT is transforming the ordinary physical objects around us into an ecosystem of information that will enrich our lives. The key to this ecosystem is the cooperation among the devices, where things look for other things to provide composite services for the benefit of human beings. However, cooperation among nodes can only arise when nodes trust the information received by any other peer in the system. Previous efforts on trust were concentrated on proposing models and algorithms to manage the level of trustworthiness. In this paper, we focus on modelling the interaction between trustor and trustee in the IoT and on proposing guidelines to efficiently design trust management models. Simulations show the impacts of the proposed guidelines on a simple trust model

    Can We Trust Trust Management Systems?

    Get PDF
    The Internet of Things is enriching our life with an ecosystem of interconnected devices. Object cooperation allows us to develop complex applications in which each node contributes one or more services. Therefore, the information moves from a provider to a requester node in a peer-to-peer network. In that scenario, trust management systems (TMSs) have been developed to prevent the manipulation of data by unauthorized entities and guarantee the detection of malicious behaviour. The community concentrates effort on designing complex trust techniques to increase their effectiveness; however, two strong assumptions have been overlooked. First, nodes could provide the wrong services due to malicious behaviours or malfunctions and insufficient accuracy. Second, the requester nodes usually cannot evaluate the received service perfectly. For this reason, a trust system should distinguish attackers from objects with poor performance and consider service evaluation errors. Simulation results prove that advanced trust algorithms are unnecessary for such scenarios with these deficiencies

    Analysis of Feedback Evaluation for Trust Management Models in the Internet of Things

    Get PDF
    The Internet of Things (IoT) is transforming the world into an ecosystem of objects that communicate with each other to enrich our lives. The devices’ collaboration allows the creation of complex applications, where each object can provide one or more services needed for global benefit. The information moves to nodes in a peer-to-peer network, in which the concept of trustworthiness is essential. Trust and Reputation Models (TRMs) are developed with the goal of guaranteeing that actions taken by entities in a system reflect their trustworthiness values and to prevent these values from being manipulated by malicious entities. The cornerstone of any TRM is the ability to generate a coherent evaluation of the information received. Indeed, the feedback generated by the consumers of the services has a vital role as the source of any trust model. In this paper, we focus on the generation of the feedback and propose different metrics to evaluate it. Moreover, we illustrate a new collusive attack that influences the evaluation of the received services. Simulations with a real IoT dataset show the importance of feedback generation and the impact of the new proposed attack

    Managing the Internet of Things based on its Social Structure

    Get PDF
    Society is moving towards an “always connected” paradigm, where the Internet user is shifting from persons to things, leading to the so called Internet of Things (IoT) scenario. The IoT vision integrates a large number of technologies and foresees to embody a variety of smart objects around us (such as sensors, actuators, smartphones, RFID, etc.) that, through unique addressing schemes and standard communication protocols, are able to interact with each Others and cooperate with their neighbors to reach common goals [2, 3]. IoT is a hot research topic, as demonstrated by the increasing attention and the large worldwide investments devoted to it. It is believed that the IoT will be composed of trillions of elements interacting in an extremely heterogeneous way in terms of requirements, behavior and capabilities; according to [4], by 2015 the RIFD devices alone will reach hundreds of billions. Unquestionably, the IoT will pervade every aspect of our world and will have a huge impact in our everyday life: indeed, as stated by the US National Intelligence Council (NIC) [5], “by 2025 Internet nodes may reside in everyday things − food packages, furniture, paper documents, and more”. Then, communications will not only involve persons but also things thus bringing about the IoT environment in which objects will have virtual counterparts on the Internet. Such virtual entities will produce and consume services, collaborate toward common goals and should be integrated with all the other services. One of the biggest challenges that the research community is facing right now is to be able to organize such an ocean of devices so that the discovery of objects and services is performed efficiently and in a scalable way. Recently, several attempts have been made to apply concepts of social networking to the IoT. There are scientific evidences that a large number of individuals tied in a social network can provide far more accurate answers to complex problems than a single individual (or a small group of – even knowledgeable – individuals) [1]. The exploitation of such a principle, applied to smart objects, has been widely investigated in Internet-related researches. Indeed, several schemes have been proposed that use social networks to search Internet resources, to route traffic, or to select effective policies for content distribution. The idea that the convergence of the “Internet of Things” and the “Social Networks” worlds, which up to now were mostly kept separate by both scientific and industrial communities, is possible or even advisable is gaining momentum very quickly. This is due to the growing awareness that a “Social Internet of Things” (SIoT) paradigm carries with it many desirable implications in a future world populated by objects permeating the everyday life of human beings. Therefore, the goal of this thesis is to define a possible architecture for the SIoT, which includes the functionalities required to integrate things into a social network, and the needed strategies to help things to create their relationships in such a way that the resulting social network is navigable. Moreover, it focuses on the trustworthiness management, so that interaction among objects that are friends can be done in a more reliable way and proposes a possible implementation of a SIoT network. Since this thesis covers several aspects of the Social internet of Things, I will present the state of the art related to the specific research activities at the beginning of every Chapter. The rest of the thesis is structured as follows. In Chapter 1, I identify appropriate policies for the establishment and the management of social relationships between objects, describe a possible architecture for the IoT that includes the functionalities required to integrate things into a social network and analyze the characteristics of the SIoT network structure by means of simulations. Chapter 2 addresses the problem of the objects to manage a large number of friends, by analyzing possible strategies to drive the objects to select the appropriate links for the benefit of overall network navigability and to speed up the search of the services. In Chapter 3, I focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects and define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. Chapter 4 presents an implementation of a SIoT platform and its major functionalities: how to register a new social object to the platform, how the system manages the creation of new relationships, and how the devices create groups of members with similar characteristics. Finally, in Chapter 5, conclusions will be drawn regarding the effectiveness of the proposed Introduction 3 algorithms, and some possible future works will be sketche

    A Channel Selection Model based on Trust Metrics for Wireless Communications

    Get PDF
    Dynamic allocation of frequency resources to nodes in a wireless communication network is a well-known method adopted to mitigate potential interference, both unintentional and malicious. Various selection approaches have been adopted in literature, to limit the impact of interference and keep a high quality of wireless links. In this paper, we propose a different channel selection method, based on trust policies. The trust management approach proposed in this work relies on the node’s own experience and trust recommendations provided by its neighbourhood. By means of simulation results in Network Simulator NS-3, we demonstrate the effectiveness of the proposed trust method, while the system is under jamming attacks, in respect of a baseline approach. We also consider and evaluate the resilience of our approach in respect of malicious nodes, providing false information regarding the quality of the channel, to induct bad channel selection of the node. Results show how the system is resilient in respect of malicious nodes, keeping around 10% of throughput more than an approach only based on the own proper experience, considering the presence of 40% of malicious nodes, both single and collusive attacks

    The Virtual Object as a Major Element of the Internet of Things: a Survey

    Get PDF
    The Internet of Things (IoT) paradigm has been evolving toward the creation of a cyber-physical world where everything can be found, activated, probed, interconnected, and updated, so that any possible interaction, both virtual and/or physical, can take place. A Crucial concept of this paradigm is that of the virtual object, which is the digital counterpart of any real (human or lifeless, static or mobile, solid or intangible) entity in the IoT. It has now become a major component of the current IoT platforms, supporting the discovery and mash up of services, fostering the creation of complex applications, improving the objects energy management efficiency, as well as addressing heterogeneity and scalability issues. This paper aims at providing the reader with a survey of the virtual object in the IoT world. Virtualness is addressed from several perspectives: historical evolution of its definitions, current functionalities assigned to the virtual object and how they tackle the main IoT challenges, and major IoT platforms, which implement these functionalities. Finally, we illustrate the lessons learned after having acquired a comprehensive view of the topic

    Enhancing the navigability in a social network of smart objects: a Shapley-value based approach

    Get PDF
    The Internet of Things (IoT) holds the promise to interconnect any possible object capable of providing useful information about the physical world for the benefit of humans' quality of life. The increasing number of heterogeneous objects that the IoT has to manage introduces crucial scalability issues that still need appropriate solutions. In this respect, one promising proposal is the Social IoT (SIoT) paradigm, whose main principle is to enable objects to autonomously establish social links with each other (adhering to rules set by their owners). "Friend" objects exchange data in a distributed manner and this avoids centralized solutions to implement major functions, such as: node discovery, information search, and trustworthiness management. However, the number and types of established friendships affect network navigability. This issue is the focus of this paper, which proposes an efficient, distributed and dynamic solution for the objects to select the right friends for the benefit of the overall network connectivity. The proposed friendship selection mechanism relies on a game theoretic model and a Shapley-value based algorithm. Two different utility functions are defined and evaluated based on either a group degree centrality and an average local clustering parameter. The comparison in terms of global navigability is measured in terms of average path length for the interconnection of any couple of nodes in the network. Results show that the group degree centrality brings to an enhanced degree of navigability thanks to the ability to create a suitable core of hubs

    Exploiting social internet of things features in cognitive radio

    Get PDF
    Cognitive radio (CR) represents the proper technological solution in case of radio resources scarcity and availability of shared channels. For the deployment of CR solutions, it is important to implement proper sensing procedures, which are aimed at continuously surveying the status of the channels. However, accurate views of the resources status can be achieved only through the cooperation of many sensing devices. For these reasons, in this paper, we propose the utilization of the Social Internet of Things (SIoT) paradigm, according to which objects are capable of establishing social relationships in an autonomous way, with respect to the rules set by their owners. The resulting social network enables faster and trustworthy information/service discovery exploiting the social network of friend'' objects.We first describe the general approach according to which members of the SIoT collaborate to exchange channel status information. Then, we discuss the main features, i.e., the possibility to implement a distributed approach for a low-complexity cooperation and the scalability feature in heterogeneous networks. Simulations have also been run to show the advantages in terms of increased capacity and decreased interference probability

    A subjective model for trustworthiness evaluation in the social Internet of Things

    Get PDF
    The integration of social networking concepts into the Internet of Things (IoT) has led to the so called Social Internet of Things (SIoT) paradigm, according to which the objects are capable of establishing social relationships in an autonomous way with respect to their owners. The benefits are those of improving scalability in information/service discovery when the SIoT is made of huge numbers of heterogeneous nodes, similarly to what happens with social networks among humans. In this paper we focus on the problem of understanding how the information provided by the other members of the SIoT has to be processed so as to build a reliable system on the basis of the behavior of the objects. We define a subjective model for the management of trustworthiness which builds upon the solutions proposed for P2P networks. Each node computes the trustworthiness of its friends on the basis of its own experience and on the opinion of the common friends with the potential service providers. We employ a feedback system and we combine the credibility and centrality of the nodes to evaluate the trust level. Preliminary simulations show the benefits of the proposed model towards the isolation of almost any malicious node in the network
    • 

    corecore