scispace - formally typeset
Search or ask a question
Book ChapterDOI

Evolution of Social IoT World: Security Issues and Research Challenges

10 Oct 2017-pp 77-98
About: The article was published on 2017-10-10. It has received 4 citations till now.
Citations
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: The primary aim of this research work is to state the risks and threats that faces SIoT by identifying the essential domains in whichSIoT is highly used in higher education, and the existing security solutions which have been proposed or applied with their barriers.
Abstract: Within the trials of the utilization of technology for the society, efforts have proven advantages of the new wave of rapid-growth change that began and is anticipating to proliferate with more potent connectivity and interoperability of diverse devices, named as the Social internet of things (SIoT). It is a rising paradigm of IoT wherein distinctive IoT devices interact and set up relationships with each in the academic field nowadays. Objects are establishing their social relationships in an unbiased way. The main issue is to understand how the objects in Social IoT can interact in the higher education systems to implement a secure system. Consequently, focus on the trustworthiness models. Because of the billions of linked devices, there may be a huge risk of identity and information leakage, device manipulation, records falsification, server/network attack and subsequent effect to application platforms. Whilst the variety of these interconnected devices keeps to grow each day in the academic learning field, So, does the wide variety of security threats and vulnerabilities posed to these devices at universities. Security is one of the most paramount technological studies troubles that exist nowadays for IoT. Security has many aspects; security built in the device, security of data transmission and data storage inside the systems and its applications. There may be an intensive quantity of literature that exists on the problem with endless issues as well as proposed solutions; however, maximum of the existing paintings does no longer provide a holistic view of protection and data privacy issues in the IoT. The primary aim of this research work is to state the risks and threats that faces SIoT by identifying (a) The essential domains in which SIoT is highly used in higher education, (b) The security necessities and challenges that SIoT is currently dealing with, (c) the existing security solutions which have been proposed or applied with their barriers.

14 citations

Proceedings Article
01 Jan 2019
TL;DR: Internet of Things (IoT) connects machines, devices, sensors and people and this technology is expected to connect billions of devices in the near future.
Abstract: Internet of Things (IoT) connects machines, devices, sensors and people. This technology is expected to connect billions of devices in the near future. Traditional methods make it very difficult to ...

10 citations


Cites background from "Evolution of Social IoT World: Secu..."

  • ...There are similarities between the idea behind IoT and the idea of social networks (SN) (Panda et al. 2017)....

    [...]

Journal ArticleDOI
Robert J Burkhart1
TL;DR: In this article , an approach can be developed in which one has to observe and track down a reasonable method of making a rationale that invigorates human discourse to the actual code composed by software engineers and designers.
Abstract: Developers tend to waste a lot of time building a backend, which in turn extends the entire development cycle by several hours, consuming valuable time on additional complex tasks. In this article, an approach can be developed in which one has to observe and track down a reasonable method of making a rationale that invigorates human discourse to the actual code composed by software engineers and designers. It can be utilized to tailor one’s own backend rationale for any application with an equivalent one. Consequently, the entire thought is to give an interface to developers for rearranging and computerizing code by uniting two diversified progressive thoughts, a chatbot for deciphering and handling-off the human thoughts, and a backend structure to create and make the rationale dependent on customized human requirements. It works on the synergy of NLP and text processing along with backend frameworks to stimulate a paradigm shift in backend generation.

1 citations

DOI
01 Jan 2022
TL;DR: In this paper, a secure and reliable transmission among the Things of social networks to withstand single-point failure is proposed, where the blockchain module is introduced on top of the SIoT network to come up with the novel framework referred to as BlockSIoT to achieve a level of integrity and steer the intercommunication and community interest between the Things.
Abstract: The advancements of the Internet of Things (IoT) lead to the deployment of smart objects on online social networks to offer a different paradigm, referred to as the Social Internet of Things (SIoT). The social networking things evolve with intelligence in autonomously establishing social links to explore the objects. Nevertheless, the streaming data originated from billions of linked gadgets pose a challenge to render elasticity and security to the users. Cloud and edge computing provides seamless services toward the elasticity of data for SIoT users. However, security in the cloud is a point of debate. Among the varied security and storage aspects, we concentrate on secure data transmission, storage mapping, and their purpose in service provision to improve information sharing. This paper concentrates on offering a secure and reliable transmission among the Things of social networks to withstand single-point failure. We introduced the blockchain module on top of the SIoT network to come up with the novel framework referred to as BlockSIoT to achieve a level of integrity and steer the intercommunication and community interest between the Things to crowd SIoT.
References
More filters
Journal ArticleDOI
TL;DR: SIoV is a vehicular instance of the Social IoT (SIoT), where vehicles are the key social entities in the machine-to-machine vehicular social networks and the social structures of SIoV components, their relationships, and the interaction types are identified.
Abstract: The main vision of the Internet of Things (IoT) is to equip real-life physical objects with computing and communication power so that they can interact with each other for the social good. As one of the key members of IoT, Internet of Vehicles (IoV) has seen steep advancement in communication technologies. Now, vehicles can easily exchange safety, efficiency, infotainment, and comfort-related information with other vehicles and infrastructures using vehicular ad hoc networks (VANETs). We leverage on the cloud-based VANETs theme to propose cyber-physical architecture for the Social IoV (SIoV). SIoV is a vehicular instance of the Social IoT (SIoT), where vehicles are the key social entities in the machine-to-machine vehicular social networks. We have identified the social structures of SIoV components, their relationships, and the interaction types. We have mapped VANETs components into IoT-A architecture reference model to offer better integration of SIoV with other IoT domains. We also present a communication message structure based on automotive ontologies, the SAE J2735 message set, and the advanced traveler information system events schema that corresponds to the social graph. Finally, we provide the implementation details and the experimental analysis to demonstrate the efficacy of the proposed system as well as include different application scenarios for various user groups.

334 citations