Journal articles on the topic 'Social Internet of Things (Social IoT)'

To see the other types of publications on this topic, follow the link: Social Internet of Things (Social IoT).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Social Internet of Things (Social IoT).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Milivojević, Sanja, and Elizabeth Radulski. "The 'Future Internet' and crime: Towards a criminology of the Internet of Things." Crimen 11, no. 3 (2020): 255–71. http://dx.doi.org/10.5937/crimen2003255m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".
2

Sowa, Grzegorz, and Alina Marchlewska. "The Internet of Things: Technological and Social Aspects." Journal of Applied Computer Science Methods 8, no. 1 (June 1, 2016): 17–27. http://dx.doi.org/10.1515/jacsm-2016-0002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract The basic idea of is the Internet of Things is presence around us of a variety of things – such as RFID tags, sensors, actuators, mobile phones, etc. – which are able to interact with each other and cooperate with their neighbors to reach common goals. Semantic oriented IoT visions have also been proposed. The number of items involved in the future Internet is destined to become extremely high. Therefore, issues pertaining how to represent, store, interconnect, search, and organize information generated by the IoT will become very challenging. In this context, semantic technologies will play a key role. And creative approaches to visualizing data – humans are far better than computers at seeing patterns –frequently prove integral to the process of creating knowledge. From a privacy perspective, IoT is challenging because it operates in private settings, like homes, and presents an attack target that is harder to secure.
3

Bok, Kyoungsoo, Yeondong Kim, Dojin Choi, and Jaesoo Yoo. "User Recommendation for Data Sharing in Social Internet of Things." Sensors 21, no. 2 (January 11, 2021): 462. http://dx.doi.org/10.3390/s21020462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As various types of data are generated on the social Internet of things (SIoT), which combine the Internet of things (IoT) and social networks, the relations of IoT devices should be established for necessary data exchange. In this paper, we propose a user recommendation scheme that facilitates data sharing through an analysis of an interaction between an IoT device and a user in the SIoT. An interrelation between a user and an IoT device as well as an interrelation between users exist simultaneously in the SIoT. Hence, the interaction between users must be analyzed to identify the interest keywords, and the interaction between IoT devices and users to determine the user’s preference of IoT device. Moreover, the proposed scheme calculates the similarity between users based on the IoT device preference based on IoT device usage frequency and interest keywords, which are identified through an analysis between the user and IoT device and that between users. Subsequently, it recommends top-N users who have a high similarity as the users for data sharing. Furthermore, the performance of the proposed scheme is verified through performance evaluation based on the precision, recall, and F-measure.
4

Bok, Kyoungsoo, Yeondong Kim, Dojin Choi, and Jaesoo Yoo. "User Recommendation for Data Sharing in Social Internet of Things." Sensors 21, no. 2 (January 11, 2021): 462. http://dx.doi.org/10.3390/s21020462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As various types of data are generated on the social Internet of things (SIoT), which combine the Internet of things (IoT) and social networks, the relations of IoT devices should be established for necessary data exchange. In this paper, we propose a user recommendation scheme that facilitates data sharing through an analysis of an interaction between an IoT device and a user in the SIoT. An interrelation between a user and an IoT device as well as an interrelation between users exist simultaneously in the SIoT. Hence, the interaction between users must be analyzed to identify the interest keywords, and the interaction between IoT devices and users to determine the user’s preference of IoT device. Moreover, the proposed scheme calculates the similarity between users based on the IoT device preference based on IoT device usage frequency and interest keywords, which are identified through an analysis between the user and IoT device and that between users. Subsequently, it recommends top-N users who have a high similarity as the users for data sharing. Furthermore, the performance of the proposed scheme is verified through performance evaluation based on the precision, recall, and F-measure.
5

Hemmati, Mahdi. "Analyzing the Effect of Social Internet of Things on Making the Internet Marketing Smart." Modern Applied Science 10, no. 9 (July 20, 2016): 213. http://dx.doi.org/10.5539/mas.v10n9p213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of social internet of things in recent years led to widening the data and information scope. A wide scope of new services caused by this procedure. In this regard, a new pattern called the social internet of things is created by integrating the social network and internet of things (IOT) which shows the network communication of things. IOS can put a step toward the marketing world. In this paper, the effect of IoT on internet marketing and making it smart are taken into consideration by considering marketing in human social network.
6

H. Dutton, William. "Putting things to work: social and policy challenges for the Internet of things." info 16, no. 3 (May 6, 2014): 1–21. http://dx.doi.org/10.1108/info-09-2013-0047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose – This paper aims to provide a critical assessment of the Internet of things (IoT) and the social and policy issues raised by its development. While the Internet will continue to become ever more central to everyday life and work, there is a new but complementary vision for an IoT, which will connect billions of objects – “things” like sensors, monitors, and radio-frequency identification devices – to the Internet at a scale that far outstrips use of the Internet as we know it, and will have enormous social and economic implications. Design/methodology/approach – It is based on a review of literature and emerging developments, including synthesis of a workshop and discussions within a special interest group on the IoT. Findings – Nations can harvest the potential of this wave of innovation not only for manufacturing but also for everyday life and work and the development of new information and services that will change the way we do things in many walks of life. However, its success is not inevitable. Technical visions will not lead inexorably to successful public and private infrastructures that support the vitality of an IoT and the quality of everyday life and work. In fact, the IoT could undermine such core values as privacy, equality, trust and individual choice if not designed, implemented and governed in appropriate ways. Research limitations/implications – There is a need for more multi-disciplinary research on the IoT. Practical implications – Policymakers and opinion formers need to understand the IoT and its implications. Social implications – If the right policies and business models are developed, the IoT will stimulate major social, economic and service innovations in the next years and decades. Originality/value – This paper pulls together discussions and literature from a social science perspective, as one means to enable more multidisciplinary studies of emerging developments.
7

Hamed M. Almalki. "The impact of social media, big data and IOT on the supply chain management performance." Global Journal of Engineering and Technology Advances 12, no. 3 (September 30, 2022): 067–76. http://dx.doi.org/10.30574/gjeta.2022.12.3.0163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of Industry 4.0, a new digital industrial technology, has a favorable effect on how well the supply chain functions. Big Data, Social Media, and the Internet of Things (IoT) have all been proposed as ways to enhance supply chain performance. Although there has been limited exploratory research in this area, the favorable impact of the Internet of Things (IoT), Social Media, and Big Data on Supply Chain on supply chain and company performance has been empirically confirmed. How the logistics sector is being impacted by Big Data, IoT, and Social Media from a business and customer perspective? Can the Supply Chain be managed and controlled more effectively because of the integration of social media and ICT? Does Supply chain management get better with the incorporation of information and communication technology? The initial goal of this study is to demonstrate the connection that already exists between supply chain management, social media, big data, and the internet of things. Second, we'll discuss how the integration of social media, big data, and the internet of things has affected the sustainability, efficiency, and various flows of supply chain management.
8

Shin, Taehwan, and Jinsung Byun. "Design and Implementation of a Vehicle Social Enabler Based on Social Internet of Things." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/4102163.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In recent years, the combination of novel context-aware systems with the Internet of Things (IoT) has received great attention with the advances in network and context-awareness technologies. Various context-aware consumer electronics based on IoT for intelligent and personalized user-centric services have been introduced. However, although the paradigm of the IoT has evolved from smart objects into social objects, the existing context-aware systems have not reflected the changes in these paradigms well. Therefore, this paper proposes a social enabler (S-Enabler) in order to overcome this limitation. The S-Enabler plays an important role in converting the existing objects into social objects. This paper presents the middleware architecture and cooperation processes for a social IoT-based smart system. In this paper, the S-Enabler is designed to be applied to a vehicle and an energy saving service is introduced by using the S-Enabler. The proposed energy saving service can reduce energy consumption and fuel consumption based on social behaviors such as sharing or competition. The performance of the S-Enabler is discussed through a simple vehicle service scenario. The experimental results show that the S-Enabler reduced fuel consumption by up to 31.7%.
9

Komarov, Mikhail, Nikita Konovalov, and Nikolay Kazantsev. "How Internet of Things Influences Human Behavior Building Social Web of Services via Agent-Based Approach." Foundations of Computing and Decision Sciences 41, no. 3 (September 1, 2016): 197–210. http://dx.doi.org/10.1515/fcds-2016-0012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractThe paper discovers potential human interactions with growing amount of internet of things (IoT) via proposed concept of Social Web of Services (classical social web with smart things - daily life objects connected to the internet). To investigate the impact of IoT on user behaviour patterns we modelled human-thing interactions using agent-based simulation (ABM). We have proved that under certain conditions SmartThings, connected to the IoT, are able to change patterns of Human behaviour. Results of this work predict our way of living in the era of caused by viral effects of IoT application (HCI and M2M connections), and could be used to foster business process management in the IoT era.
10

Gao, Yunpeng, and Nan Zhang. "Social Security and Privacy for Social IoT Polymorphic Value Set: A Solution to Inference Attacks on Social Networks." Security and Communication Networks 2019 (August 28, 2019): 1–16. http://dx.doi.org/10.1155/2019/5498375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Social Internet of Things (SIoT) integrates social network schemes into Internet of Things (IoT), which provides opportunities for IoT objects to form social communities. Existing social network models have been adopted by SIoT paradigm. The wide distribution of IoT objects and openness of social networks, however, make it more challenging to preserve privacy of IoT users. In this paper, we present a novel framework that preserves privacy against inference attacks on social network data through ranked retrieval models. We propose PVS, a privacy-preserving framework that involves the design of polymorphic value sets and ranking functions. PVS enables polymorphism of private attributes by allowing them to respond to different queries in different ways. We begin this work by identifying two classes of adversaries, authenticity-ignorant adversary, and authenticity-knowledgeable adversary, based on their knowledge of the distribution of private attributes. Next, we define the measurement functions of utility loss and propose PVSV and PVST that preserve privacy against authenticity-ignorant and authenticity-knowledgeable adversaries, respectively. We take into account the utility loss of query results in the design of PVSV and PVST. Finally, we show that PVSV and PVST meet the privacy guarantee with acceptable utility loss in extensive experiments over real-world datasets.
11

Naderlou, Lida, Nigar Ismayilova, and Azar Feyziyev. "A REVIEW SIOT (SOCIAL INTERNET OF THINGS): TECHNIQUES, APPLICATIONS, CHALLENGES AND TRENDS." Azerbaijan Journal of High Performance Computing 5, no. 2 (December 31, 2022): 236–53. http://dx.doi.org/10.32010/26166127.2022.5.2.236.253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The social or human actions in the IoT platform derive the new paradigm in the IoT environment called the Social Internet of Things (SIoT). The Social Internet of Things is that part of an IoT capable of establishing social relationships with other objects concerning humans. SIoT attempts to moderate IoT challenges in scalability, trust, and resource discovery by taking a cue from social computing. In the IoT family, there is a subset of SIoT, a relatively recent concept. Moreover, a method of integrating IoT with social networking. SIoT is a simulation of human-to-human and object-to-object social networks where Humans are called intellectual and relational objects. They build their social network to accomplish shared objectives such as enhancing accessibility, success, and productivity and providing their needed services. This paper has extensively surveyed the SIoT (social Internet of things) for beginners involved in SIoT Studies. This paper gives you a clear view and ideas about SIoT's architecture, relationships, trust management, and applications and challenges implemented related to SIoT.
12

Amin, Farhan, Awais Ahmad, and Gyu Sang Choi. "Towards Trust and Friendliness Approaches in the Social Internet of Things." Applied Sciences 9, no. 1 (January 4, 2019): 166. http://dx.doi.org/10.3390/app9010166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is an interconnected network of heterogeneous entities, such as sensors and embedded devices. During the current era, a new field of research has emerged, referred to as the social IoT, which mainly includes social networking features. The social IoT refers to devices that are capable of creating interactions with each other to independently achieve a common goal. Based on the structure, the support of numerous applications, and networking services, the social IoT is preferred over the traditional IoT. However, aspects like the roles of users and network navigability are major challenges that provoke users’ fears of data disclosure and privacy violations. Thus, it is important to provide reliable data analyses by using trust- and friendliness-based properties. This study was designed because of the limited availability of information in this area. It is a classified catalog of trust- and friendliness-based approaches in the social IoT with important highlights of important constraints, such as scalability, adaptability, and suitable network structures (for instance, human-to-human and human-to-object). In addition, typical concerns like communities of interest and social contacts are discussed in detail, with particular emphasis on friendliness- and trust-based properties, such as service composition, social similarity, and integrated cloud services.
13

Amin, Farhan, Ikram Asghar, Aftab Ali, and Seong-Oun Hwang. "Recent Advances in Internet of Things and Emerging Social Internet of Things: Vision, Challenges and Trends." Electronics 11, no. 13 (June 29, 2022): 2033. http://dx.doi.org/10.3390/electronics11132033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In recent years, the Internet of Things (IoT), together with its related emerging technologies, has been driving a revolution in the way people perceive and interact with the surrounding environment [...]
14

van der Zeeuw, Alex, Alexander JAM van Deursen, and Giedo Jansen. "Inequalities in the social use of the Internet of things: A capital and skills perspective." New Media & Society 21, no. 6 (January 4, 2019): 1344–61. http://dx.doi.org/10.1177/1461444818821067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this article, we set out to explain different types of social uses of the Internet of Things (IoT) using forms of capital and Internet skills. We argue that the IoT platform entices different manners of social communication that are easily overlooked when focusing on the novelty of smart “things.” How people use the IoT socially is crucial in trying to understand how people create, maintain, or absolve social relations in a networked society. We find inversed effects for social capital, income and education on private use, and on sharing IoT data with a partner. Sharing with acquaintances and strangers is predicted by cultural activities. Sharing IoT data with acquaintances can especially be attributed to social relations that escape the immediate household. We conclude that varying figurations of capital and Internet skills predict how the IoT is used socially.
15

Li, Yun Hong, and Gao Ming Liang. "The Prospect of the Internet of Things." Applied Mechanics and Materials 263-266 (December 2012): 2853–56. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things(IOT) is used very widely in various of fields, it brings great convenience to people and promotes social civilization and progress. Focused on the development of IOT and some key technologies which are applied by it, and pointed out its trend of development.
16

Muhammad, Shad, Muneer Umar, Shafiullah Khan, A. Alrajeh, and A. Mohammed. "Honesty-Based Social Technique to Enhance Cooperation in Social Internet of Things." Applied Sciences 13, no. 5 (February 21, 2023): 2778. http://dx.doi.org/10.3390/app13052778.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Social Internet of Things (SIoT) can be seen as integrating the social networking concept into the Internet of Things (IoT). Such networks enable different devices to form social relationships among themselves depending on pre-programmed rules and the preferences of their owners. When SIoT devices encounter one another on the spur of the moment, they seek out each other’s assistance. The connectivity of such smart objects reveals new horizons for innovative applications empowering objects with cognizance. This enables smart objects to socialize with each other based on mutual interests and social aspects. Trust building in social networks has provided a new perspective for providing services to providers based on relationships like human ones. However, the connected IoT nodes in the community may show a lack of interest in forwarding packets in the network communication to save their resources, such as battery, energy, bandwidth, and memory. This act of selfishness can highly degrade the performance of the network. To enhance the cooperation among nodes in the network a novel technique is needed to improve the performance of the network. In this article, we address the issue of the selfishness of the nodes through the formation of a credible community based on honesty. A social process is used to form communities and select heads in these communities. The selected community heads having social attributes prove effective in determining the social behavior of the nodes as honest or selfish. Unlike other schemes, the dishonest nodes are isolated in a separate domain, and they are given several chances to rejoin the community after increasing their honesty levels. The proposed social technique was simulated using MATLAB and compared with existing schemes to show its effectiveness. Our proposed technique outperforms the existing techniques in terms of throughput, overhead, packet delivery ratio (PDR), and packet-delivery latency.
17

Sangoleye, Fisayo, Nafis Irtija, and Eirini Eleni Tsiropoulou. "Smart Energy Harvesting for Internet of Things Networks." Sensors 21, no. 8 (April 13, 2021): 2755. http://dx.doi.org/10.3390/s21082755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this article, we address the problem of prolonging the battery life of Internet of Things (IoT) nodes by introducing a smart energy harvesting framework for IoT networks supported by femtocell access points (FAPs) based on the principles of Contract Theory and Reinforcement Learning. Initially, the IoT nodes’ social and physical characteristics are identified and captured through the concept of IoT node types. Then, Contract Theory is adopted to capture the interactions among the FAPs, who provide personalized rewards, i.e., charging power, to the IoT nodes to incentivize them to invest their effort, i.e., transmission power, to report their data to the FAPs. The IoT nodes’ and FAPs’ contract-theoretic utility functions are formulated, following the network economic concept of the involved entities’ personalized profit. A contract-theoretic optimization problem is introduced to determine the optimal personalized contracts among each IoT node connected to a FAP, i.e., a pair of transmission and charging power, aiming to jointly guarantee the optimal satisfaction of all the involved entities in the examined IoT system. An artificial intelligent framework based on reinforcement learning is introduced to support the IoT nodes’ autonomous association to the most beneficial FAP in terms of long-term gained rewards. Finally, a detailed simulation and comparative results are presented to show the pure operation performance of the proposed framework, as well as its drawbacks and benefits, compared to other approaches. Our findings show that the personalized contracts offered to the IoT nodes outperform by a factor of four compared to an agnostic type approach in terms of the achieved IoT system’s social welfare.
18

Húdik, Martin, Gabriel Koman, Jorma Jaakko Imppola, and Josef Vodák. "Use of the Internet of Things in the Business Environment to Smart Business." LOGI – Scientific Journal on Transport and Logistics 10, no. 2 (November 1, 2019): 42–50. http://dx.doi.org/10.2478/logi-2019-0014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract The article discusses the use of Internet of Things (hereinafter as IoT) solutions in the social and business environment to support managerial decision-making in Smart businesses. The paper key objective is to assess the rate of increasing technological advancement of the IoT which already affects us all, so it is not possible to talk about the IoT as a matter of the future. Currently, modern technologies provide specific level of digitization of business processes. Due to the penetration of information and communication technologies (hereinafter as ICT) in all areas of social life and business processes, it is possible to implement decisions on product production based on customer needs and requirements. This trend is mainly due to technological advances in ICT and the Internet. Thanks to the internet and the phenomenon called Internet of Things, it is possible to achieve higher profits and improve the quality of life in society. The manuscript main findings can be summarized through a statement that all the businesses try to implement the concept of IoT in their processes, and thus they become smart businesses. Thanks to IoT, businesses can quickly process data and distribute the results to responsible people for decision-making in the enterprise.
19

Kilani, Rim, Ahmed Zouinkhi, Eddy Bajic, and Mohamed Naceur Abdelkrim. "A Socio-Inspired Methodology and Model for Advanced and Opportunistic Interactions between Industrial IoT Objects." Electronics 11, no. 8 (April 18, 2022): 1281. http://dx.doi.org/10.3390/electronics11081281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The concept of the Internet of Things (IoT) is widely discussed. IoT is one of the emerging technologies that have caught the attention of many researchers. The increase in the number of exchanges of services between heterogeneous or homogeneous connected objects with the integration of social networking concepts gives rise to the concept of the Social Internet of Things (SIoT). The SIoT concept contributes to the evolution of interactions between industrial objects by improving deterministic mechanisms towards intelligent interactions. The integration of the SIoT concept into the Industrial Internet of Things (IIoT) gives rise to the Social Internet of Industrial Things (SIoIT) and plays an important role in improving system performance in Industry 4.0. In this article, we propose an innovative methodology and a model of socio-inspired interaction between industrial communicating objects inspired by sociological approaches. Thanks to this model, socialized industrial communicating objects form a community of objects, autonomously and dynamically, by exchanging messages to know each other perfectly, and service requests between objects are executed adaptively according to the principles of social interaction governed by socio-inspired strategies and conditions. The model is implemented, tested and validated in a Netlogo multi-agent system simulation environment.
20

Chang, YaPing, XueBing Dong, and Wei Sun. "Influence of Characteristics of the Internet of Things on Consumer Purchase Intention." Social Behavior and Personality: an international journal 42, no. 2 (March 15, 2014): 321–30. http://dx.doi.org/10.2224/sbp.2014.42.2.321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
We studied the mechanism of the influence of the Internet of Things (IOT) product characteristics on consumer purchase intention. The results of a survey of 360 consumers showed that 6 dimensions of IOT product characteristics influence purchase intention; namely connectivity, interactivity, telepresence, intelligence, convenience, and security. We found that customer experience was the key mediating variable in the relationship between IOT product characteristics and purchase intention. Connectivity, interactivity, telepresence, intelligence, convenience, and security all positively influenced purchase intention via functional experience. Furthermore, connectivity, telepresence, convenience, and security positively influenced purchase intention via emotional experience. Our findings in the study provide some points of reference for improvement of IOT product design.
21

Gao, Zhijun, Zhenyu Liu, and Jingmin An. "Cyber-Physical-Social Model for Service Recommendation in the Internet of Things." Mathematical Problems in Engineering 2022 (May 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9523984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The services in the Internet of Things (IoT) are the key components to realize the value of IoT. The entity-oriented services are discovered from data. However, a large number of heterogeneous data and entities in IoT increase the difficulty of service development. For this, we propose a cyber-physical-social model to recommend services in IoT. The model consists of four layers: in the physical layer, the individual behavior pattern is defined. The system layer is responsible for handling interaction data to solve the heterogeneous data problem. The cyber layer is the agent layer, where we use the defined agents to establish service logic, shielding the entity heterogeneous problem. In the social layer, we explore the behavior similarity between individual users, achieving entity interaction in different scenes. In experiments, we obtain the data from 5 scenes, and the data is used for 6 experiments. In terms of accuracy and response time, our model has outstanding advantages compared with the previous methods.
22

Cirillo, Flavio, Fang-Jing Wu, Gürkan Solmaz, and Ernö Kovacs. "Embracing the Future Internet of Things." Sensors 19, no. 2 (January 16, 2019): 351. http://dx.doi.org/10.3390/s19020351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
All of the objects in the real world are envisioned to be connected and/or represented, through an infrastructure layer, in the virtual world of the Internet, becoming Things with status information. Services are then using the available data from this Internet-of-Things (IoT) for various social and economical benefits which explain its extreme broad usage in very heterogeneous fields. Domain administrations of diverse areas of application developed and deployed their own IoT systems and services following disparate standards and architecture approaches that created a fragmentation of things, infrastructures and services in vertical IoT silos. Coordination and cooperation among IoT systems are the keys to build “smarter” IoT services boosting the benefits magnitude. This article analyses the technical trends of the future IoT world based on the current limitations of the IoT systems and the capability requirements. We propose a hyper-connected IoT framework in which “things” are connected to multiple interdependent services and describe how this framework enables the development of future applications. Moreover, we discuss the major limitations in today’s IoT and highlight the required capabilities in the future. We illustrate this global vision with the help of two concrete instances of the hyper-connected IoT in smart cities and autonomous driving scenarios. Finally, we analyse the trends in the number of connected “things” and point out open issues and future challenges. The proposed hyper-connected IoT framework is meant to scale the benefits of IoT from local to global.
23

Jadhao, Prof Y. B. "Trust Based Service Management for Social Internet of Things: The Implementation." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 1906–20. http://dx.doi.org/10.22214/ijraset.2023.51959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: A social internet of things (Iot) system can be seen as a union of normal peer-to-peer networks and social networks, where "things" freely establish the social relations according to the owners' social networks, and search trusted "things" that can provide services stand in need of when they come into contact with each other aggressively. We have suggested and study the design notion of many easily flexible trust management system for social Internet of Things systems in which social relationships progress are not stable but they are variable among the owners of Internet of Things devices. We have been give away the planned trade-off between trust confluence vs. trust contrast in our old easily adaptive trust management protocol design. With our regular easily adaptable trust operation principals, the social Internet of effects( SIOT) operations can fluently elect the stylish trust r settings in response to changing Internet of effects social parameters similar that not only trust assessment is accurate but also the application performance is enhanced. We have propose a table-lookup method to apply the analysis results dynamically and demonstrate the practicability of our proposed adaptive trust management scheme with two actual social IoT service construction applications.
24

Forge, Simon. "Radio spectrum for the internet of things." INFO 18, no. 1 (January 11, 2016): 67–84. http://dx.doi.org/10.1108/info-11-2015-0050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose The aim of this paper is to consider whether it is possible to identify the future spectrum bands most suitable for the Internet of Things (IoT) from the operating factors of a novel set of radio services for a very wide range of applications, as an aid to policy makers now facing decisions in this area. Design/methodology/approach The approach uses characteristics of spectrum bands against the applications’ requirements to focus on specific major traits that can be matched. Findings The main choice factors for spectrum are the practical application needs and the network cost model, and these are fairly useful as matching parameters. It is forecast that multiple bands will be needed and that these should be of a licence-exempt form to seed the unfettered innovation of IoT technologies and pre-empt the formation of significant market power by concerned interests. Practical implications The way in which spectrum is allocated today will need to be reconsidered, in the light of evolving IoT requirements, which will have increasing economic and social impacts. Policy recommendations for IoT spectrum demands are outlined, and key policy options to ensure a dynamic and trustworthy development of the IoT are put forward. For instance, regulatory barriers globally will need to be removed. Originality/value Current interests in the technical requirements of the IoT have not yet given a suitable analysis of the potential spectrum uses, because too often, it is assumed that previous models of spectrum allocation will continue in the future, without consideration of the economic pressures and social context.
25

Tzafestas, Spyros. "Ethics and Law in the Internet of Things World." Smart Cities 1, no. 1 (October 12, 2018): 98–120. http://dx.doi.org/10.3390/smartcities1010006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The aim of the law is to maintain social order, peace, and justice in society, whereas the aim of ethics is to provide codes of ethics and conduct that help people to decide what is wrong, and how to act and behave. Laws provide a minimum set of standards for obtaining good human behavior. Ethics often provides standards that exceed the legal minimum. Therefore, for the best behavior, both law and ethics should be respected. The Internet of Things (IoT) involves a large number of objects and humans that are connected via the Internet ‘anytime’ and ‘anyplace’ to provide homogeneous communication and contextual services. Thus, it creates a new social, economic, political, and ethical landscape that needs new enhanced legal and ethical measures for privacy protection, data security, ownership protection, trust improvement, and the development of proper standards. This survey and opinion article is concerned with the ethics and legislation of the IoT and provides an overview of the following: definition and history of the IoT; general ethical principles and theories that are available for application in the IoT; the role of governments in the IoT; regulations in the European Union (EU) and United States for the IoT’ IoT characteristics that have the potential to create ethical problems; IoT ethical questions and principles; IoT security, privacy, and trust aspects; and the ethical culture of IoT-related companies.
26

Javida Damirova, Javida Damirova, and Laman Musayeva Laman Musayeva. "INTERNET OF THINGS." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 13, no. 02 (March 1, 2022): 33–43. http://dx.doi.org/10.36962/pahtei13022022-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article will discuss the Internet of things, which is a completely new technology. Currently, the world's most talked about new electronics use Internet of Things technology. This technology includes Google, Yandex, YouTube and all our social networks. The current benefits of Internet of Things technology will be discussed, as well as its future position. What is the role of smart technologies in the development of robotics, new electronics and the impetus for new inventions? The Internet of Things is a new paradigm that transforms traditional lifestyles into high-tech lifestyles. Many important studies and researches have been conducted to improve the technology through IoT. The Internet of Things, or IoT, refers to the billions of physical devices around the world that are now connected to the internet, all collecting and sharing data. The main purpose of this review article is to provide a detailed discussion, both technologically and socially. It is not just about the connected devices but also about the hardware, software, connectivity and communication protocols, middleware and so much more to create Internet of Things solutions as mentioned. And it’s also about many processes and technologies. So, this is most important theme in our world. The article discusses various problems and key issues in IoT, architecture and important applications. The Internet of Things is an emerging paradigm that enables the communication between electronic devices and sensors through the internet in order to facilitate our lives. IoT has also demonstrated its importance and potential for economic and industrial growth in the developing region. It is also seen as a revolutionary step in the trading and stock markets. However, data and information security is an important concern and is highly desirable, which is a major challenge that needs to be addressed. The Internet, the biggest source of security threats and cyber attacks, has opened various doors for hackers, thereby discrediting information and data. IoT is committed to providing the best possible solutions to deal with data and information security issues. IoT's most important concern in trade and the economy is security. The IoT system consists of a large number of devices and sensors that communicate with each other. They can range from a Wi-Fi pet camera on your bookshelf to a medical device implanted in your body, like a pacemaker. As long as the device is able to connect to the internet and has sensors that transmit data, it can be considered an IoT device. As the IoT network grows and expands, the number of these sensors and devices is growing rapidly. These devices communicate with each other and transmit large amounts of information over the Internet. This information is very large and flows every second, and therefore deserves to be called great information. The IoT was initially most interesting to business and manufacturing, where its application is sometimes known as machine-to-machine (mean - M2M), but the emphasis is now on filling our homes and offices with smart devices, transforming it into something. Today, these IoT projects are evolving and rapidly spreading to all platforms. It is possible to find IoT projects for each topic. As mentioned earlier, IoT projects are designed to make life easier. These projects, created to help as many people as possible, will be the most important part of our future lives. It will be impossible to imagine our lives without the Internet of Things and smart projects. A smart city with sensors covering all its regions using diverse tangible gadgets and objects all over the community and connected with the help of internet. The continuous expansion of IoT-based networks poses complex challenges such as data management and collection, storage and processing, and analytics. This article sheds light on the existing literature and describes their contributions to various aspects of IoT. This article will help readers and researchers understand IoT and its application to the real world Keywords: arduino, sensors, security systems, robotics, intelligent technology.
27

Simon Wewoliamo Kuseh, Henry Nunoo-Mensah, Griffith Selorm Klogo, and Eric Tutu Tchao. "A Survey of Trust Management Schemes for Social Internet of Things." Inform : Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi 7, no. 1 (June 9, 2022): 48–58. http://dx.doi.org/10.25139/inform.v7i1.4567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Social Internet of Things (SIoT) involves integrating social networking concepts in the Internet of Things (IoT) to enhance social interactions among IoT objects and users. SIoT is envisaged to provide adequate service selection and discovery. Trust is an essential factor whenever social concepts are discussed in communication networks. Trust usually leads to a mutual relationship between two parties (i.e., the trustor and trustee) where they both enjoy mutual benefits. For secure social relationships, Trust management (TM) is a crucial feature of SIoT. The primary aim of this work is to provide a comprehensive review of trust management proposals/schemes available for SIoT. Four main trust calculation algorithms for trust management were selected for this review, and they were examined in detail. The IEEE Xplore, Scopus, ResearchGate, and Google Scholar databases were searched for articles containing the terms "Trust aggregation approaches in IoT", and "Trust computation in SIoT" with a particular emphasis on works published between 2018 and 2021. The paper also discussed the pros and cons of each TM technique, trust metrics/features, contributions, and limitations of the state-of-the-art SIoT TM proposals in the literature. The paper further provides open issues and possible research directions for entry-level researchers in the domain of SIoT.
28

Kuseh, Simon Wewoliamo, Henry Nunoo-Mensah, Griffith Selorm Klogo, and Eric Tutu Tchao. "A Survey of Trust Management Schemes for Social Internet of Things." Inform : Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi 7, no. 1 (January 23, 2022): 48–58. http://dx.doi.org/10.25139/inform.v7i1.4284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Social Internet of Things (SIoT) involves integrating social networking concepts in the Internet of Things (IoT) to enhance social interactions among IoT objects and users. SIoT is envisaged to provide adequate service selection and discovery. Trust is an essential factor whenever social concepts are discussed in communication networks. Trust usually leads to a mutual relationship between two parties (i.e., the trustor and trustee) where they both enjoy mutual benefits. For secure social relationships, Trust management (TM) is a crucial feature of SIoT. The primary aim of this work is to provide a comprehensive review of trust management proposals/schemes available for SIoT. Four main trust calculation algorithms for trust management were selected for this review, and they were examined in detail. The IEEE Xplore, Scopus, ResearchGate, and Google Scholar databases were searched for articles containing the terms "Trust aggregation approaches in IoT", and "Trust computation in SIoT" with a particular emphasis on works published between 2018 and 2021. The paper also discussed the pros and cons of each TM technique, trust metrics/features, contributions, and limitations of the state-of-the-art SIoT TM proposals in the literature. The paper further provides open issues and possible research directions for entry-level researchers in the domain of SIoT.
29

Cai, Ting, Yuxin Wu, Hui Lin, and Yu Cai. "Blockchain-Empowered Big Data Sharing for Internet of Things." International Journal of Web Services Research 18, no. 1 (January 2021): 58–69. http://dx.doi.org/10.4018/ijwsr.2021010104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A recent study predicts that by 2025, up to 75 billion internet of things (IoT) devices will be connected to the internet, in which data sharing is increasingly needed by massive IoT applications as a major driver of the IoT market. However, how to meet the interests of all participants in complex multi-party interactive data sharing while providing secure data control and management is the main challenge in building an IoT data sharing ecosystem. In this article, the authors propose a blockchain-empowered data sharing architecture that supports secure data monitoring and manageability in complex multi-party interactions of IoT systems. First, to build trust among different data sharing parties, the authors apply blockchain technologies to IoT data sharing. In particular, on-chain/off-chain collaboration and sharding consensus process are used to improve the efficiency and scalability of the large-scale blockchain-empowered data sharing systems. In order to encourage IoT parties to actively participate in the construction of shared ecology, the authors use an iterative double auction mechanism in the proposed architecture to maximize the social welfare of all parties as a case-study. Finally, simulation results show that the proposed incentive algorithm can optimize data allocations for each party and maximize the social welfare while protecting the privacy of all parties.
30

Song, Meng Xi, Yao Xu, Bin Zhang, and San Xing Cao. "Research and Design of the MicroBlog Content Processing System Based on Integration of Internet of Things and Social Media." Applied Mechanics and Materials 411-414 (September 2013): 317–21. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the development of the Internet and information technology, social media has brought great energy to human life. However, most of the social media is restricted to man-to-man information exchange, and there is barely entity-oriented social media. This paper focused on the integration of social media microblog and the Internet of thing (IOT) technology. An intelligent content processing system for social media was presented, aiming at meeting more convenient communication between people and smart things.
31

Kazia, Esmeralda. "Machine learning for False Information Detection in Social Internet of Things." Fusion: Practice and Applications 10, no. 1 (2023): 38–77. http://dx.doi.org/10.54216/fpa.100103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
By capitalizing on object relationships and local navigability, the Social Internet of Things (SIoT) is one of the burgeoning paradigms that could solve the technical challenges of conventional IoT. Because of this paradigm's capacity to combine conventional IoT with social media, it is possible to create smart objects and services with greater utility than those created using conventional IoT infrastructures. In recent years, scholars have become interested in SIoT, leading to a plethora of works examining various mechanisms for providing services and technologies within this context. In this vein, we present a comprehensive review of recent research covering important aspects of SIoT. In this research, we give a detailed justification for the function of several machine learning paradigms and provide a practical application of hitherto unexamined concerns relating to erroneous data and other social IoT. First, we give a classification of false news detection approaches and an analysis of these techniques. Second, the potential uses for detecting fake news are examined at length, including how it might be applied to the areas of fake profile detection, traffic management, bullying detection, etc. We also suggested a detailed review of the possibilities of machine learning algorithms for detecting bogus news and intervening in social networks. In our paper, we introduce categories of fake news detection methods providing a comparison between these methods. After that, the promising applications for false news detection is extensively discussed in terms of fake account detection, bot detection, bullying detection, and security and privacy of SIoT. Also, the paper contains a discussion of the potential of machine learning approaches for fake news detection and interventions in SIoT networks along with the state-of-the-art challenges, opportunities, and future search prospects. This article seeks for aiding the readers and researchers in explaining the motive and role of the different machine learning paradigms to offer them a comprehensive realization for so far unexplored issues related to false information and other scenarios of SIoT networks.
32

De, Suparna, and Klaus Moessner. "Sensor Networks: Physical and Social Sensing in the IoT." Sensors 23, no. 3 (January 28, 2023): 1451. http://dx.doi.org/10.3390/s23031451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Advances made in the Internet of Things (IoT) and other disruptive technological trends, including big data analytics and edge computing methods, have contributed enabling solutions to the numerous challenges affecting modern communities [...]
33

Candra, Rudi Arif, Dirja Nur Ilham, Hardisal Hardisal, and Sriwahyuni Sriwahyuni. "Light Control Design by Using Social Media Telegram Applications Based on Internet Of Things (IOT)." SinkrOn 3, no. 2 (March 18, 2019): 200. http://dx.doi.org/10.33395/sinkron.v3i2.10094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of things (IoT) is a concept with the aim of expanding the connectivity of internet network connected to global networks. Internet of Things (IoT) is used to control electronic device that utilizes internet technology to perform control processes such as lamp. This study aims to build control device that utilizes internet technology to carry out the light control process by utilizing social media telegram applications. With NodeMCU V3 as a Digital controller that supports TCP / IP technology. The testing method is carried out using 4 lights and 4 channel relays. The results obtained by the testing process by using commands on the telegram have been successful, the delay time is very dependent on internet connectivity or Wifi.
34

Das, Gouranga, and Dr Md Amir Khusru Akhtar. "Internet of Things Applications in Natural Resource Management." Technoarete Transactions on Industrial Robotics and Automation Systems 2, no. 2 (September 1, 2022): 1–11. http://dx.doi.org/10.36647/ttiras/02.02.a001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) contributes significantly to economic, social, and environmental growth. The present setting for successfully applying IoT to accomplish the Sustainable Development Goals of Natural Resource Management is deliberated in this paper. The potential and prospects of the IoT in a variety of renewable and nonrenewable natural resources, as well as present IoT difficulties, are discussed. The study methodology focuses on the IoT context in issues, as well as various IoT initiatives that are being implemented to manage such resources. Technical problems, soil, water, land, air, animal, forestry, and human application on Internet of Things for Development to accomplish the Sustainable that may benefit the globe are some of the key elements. Index Terms : Natural resource, renewable, Nonrenewable, water resource, soil, forestry, Livestock management, water, soil, air.
35

Parjuangan, Sabam, and Meliyanti Meliyanti. "Social Dimensions of Education in the Era of the Internet of Things (IoT) and COVID-19 Pandemic." Journal of Asian Social Science Research 3, no. 1 (October 23, 2021): 57–72. http://dx.doi.org/10.15575/jassr.v3i1.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of things (IoT) brings disruption to services in society including education. New platforms in educational services made possible by the internet of things have changed the way of teaching and learning activities. The question was how schools provide services to their stakeholders. This disruption was accelerated with the onset of the COVID-19 pandemic. This article aims to identify the social dimensions of education and their characteristics caused by the disruption of IoT technology and COVID-19. It examines social dimensions from the point of view of social intelligence, which comprises of three dimensions, namely social sensitivity, social insight, and social communication. In doing so, this study used a qualitative method based on a survey that involved respondents and their experience of learning through the IoT platforms. The results of this study indicate that social sensitivity and social communication were the most problematic social dimensions in learning and teaching activities through the IoT platforms. On the other hand, social insight was a very good dimension experienced by students in learning and teaching activities through IoT and during the COVID-19 pandemic.
36

Aljrad, Meiad Jrad Hamood, and Kawther Al-Dhlan. "The Effect of Using Social Engineering for Cybersecurity on the Internet of Things Environment." Journal of Science and Technology 27, no. 2 (February 28, 2023): 43–47. http://dx.doi.org/10.20428/jst.v27i2.2055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Although the Internet of Things (IoT) developers view human users as the weakest cybersecurity link and potentially a deciding factor in IoT security, IoT devices are exposed to a variety of security flaws and vulnerabilities, which most social engineers take advantage of to launch several data-collection attacks. For various purposes, this study looked at improving data security on MySQL databases and web pages by using TSL encryption protocols and the two algorithms (RSA & AES) that correlate with the Internet of Things environment and enable user authentication. The implementation was done on the proposed models and encryption methods used. This study aimed to protect the information that is shared on the Internet and connect IoT devices in a secure environment. The results revealed that the proposed study increased the level of protection with the help of complex conditions specified when registering the user and protecting it against attacks. As a result, one of the most important events that came true is the existence of cybersecurity. It is expected that this research will enhance the understanding of the IoT environment and exploit social engineering attacks to impose security on the IoT environment and preserve the rights of human users.
37

Chen, Yuanyi, Yanyun Tao, Zengwei Zheng, and Dan Chen. "Graph-based service recommendation in Social Internet of Things." International Journal of Distributed Sensor Networks 17, no. 4 (April 2021): 155014772110090. http://dx.doi.org/10.1177/15501477211009047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
While it is well understood that the emerging Social Internet of Things offers the capability of effectively integrating and managing massive heterogeneous IoT objects, it also presents new challenges for suggesting useful objects with certain service for users due to complex relationships in Social Internet of Things, such as user’s object usage pattern and various social relationships among Social Internet of Things objects. In this study, we focus on the problem of service recommendation in Social Internet of Things, which is very important for many applications such as urban computing, smart cities, and health care. We propose a graph-based service recommendation framework by jointly considering social relationships of heterogeneous objects in Social Internet of Things and user’s preferences. More exactly, we learn user’s preference from his or her object usage events with a latent variable model. Then, we model users, objects, and their relationships with a knowledge graph and regard Social Internet of Things service recommendation as a knowledge graph completion problem, where the “like” property that connects users to services needs to be predicted. To demonstrate the utility of the proposed model, we have built a Social Internet of Things testbed to validate our approach and the experimental results demonstrate its feasibility and effectiveness.
38

Eigner, Andreas, and Christian Stary. "The Role of Internet-of-Things for Service Transformation." SAGE Open 13, no. 1 (January 2023): 215824402311592. http://dx.doi.org/10.1177/21582440231159281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is increasingly becoming a key technology for service transformation, that is, the transition from pure product sales to so-called “bundles” of customer-focused combinations of products and services. These combinations are termed product-service systems. They aim to add value for the customer. However, the role of IoT in this context is not quite clear. In this contribution, therefore, we examine the role of IoT in the context of service transformation. Our structured analysis of transformation processes reveals IoT as essential enabler of digital service transformation. We explain IoT-relevance on a strategic and operational level of IoT-capable business models. IoT not only can supplement a portfolio of products on a strategic level, but also completely replace a product. At the operational level, capabilities such as remote monitoring or remote control play a crucial role. IoT also plays a crucial enabling role when the convergence between service transformation and Industry 4.0 is targeted. However, when realizing service transformation, the various IoT capabilities are mutually dependent. Hence, implementation follows in some way a waterfall-like process in which certain results are required to trigger the next development step. We describe these dependencies, and thus facilitate decision making when IoT is used for service transformation processes. Organizations can then take appropriate development actions.
39

Reddy, Anumandla Mounika. "Unique Privacy Aspects of Internet of Things." International Journal of Information technology and Computer Engineering, no. 11 (September 30, 2021): 1–6. http://dx.doi.org/10.55529/ijitc.11.1.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Coming from a working standpoint, it offers to deal with how IoT devices attach and also likewise are consistent in terms of their technical communication designs. In March 2015, the Internet Format Door (IAB) discharged an aiding house report for the social network of brilliant things (RFC 7452), which lays out a system of 4 beloved interaction styles utilized through IoT units. The discussion listed here presents this design as well as makes clear critical premium of each design in the structure. This paper discusses the unique privacy aspects of internet of things.
40

Reddy, Anumandla Mounika. "Unique Privacy Aspects Of Internet Of Things." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 11 (September 2, 2020): 28–33. http://dx.doi.org/10.55529/11.28.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Coming from a working standpoint, it offers to deal with how IoT devices attach and also likewise are consistent in terms of their technical communication designs. In March 2015, the Internet Format Door (IAB) discharged an aiding house report for the social network of brilliant things (RFC 7452), which lays out a system of 4 beloved interaction styles utilized through IoT units. The discussion listed here presents this design as well as makes clear critical premium of each design in the structure. This paper discusses the unique privacy aspects of internet of things.
41

Reddy, Anumandla Mounika. "Unique Privacy Aspects Of Internet Of Things." Journal of Artificial Intelligence, Machine Learning and Neural Network, no. 11 (September 2, 2021): 28–33. http://dx.doi.org/10.55529/jaimlnn.11.28.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Coming from a working standpoint, it offers to deal with how IoT devices attach and also likewise are consistent in terms of their technical communication designs. In March 2015, the Internet Format Door (IAB) discharged an aiding house report for the social network of brilliant things (RFC 7452), which lays out a system of 4 beloved interaction styles utilized through IoT units. The discussion listed here presents this design as well as makes clear critical premium of each design in the structure. This paper discusses the unique privacy aspects of internet of things.
42

Rizwanullah, Mohammed, Sunil Singh, Rajeev Kumar, Fatma S. Alrayes, Abdullah Alharbi, Mrim M. Alnfiai, Pawan Kumar Chaurasia, and Alka Agrawal. "Development of a Model for Trust Management in the Social Internet of Things." Electronics 12, no. 1 (December 22, 2022): 41. http://dx.doi.org/10.3390/electronics12010041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) has evolved at a revolutionary pace in the last two decades of computer science. It is becoming increasingly fashionable for the IoT to be rebranded as the “Social Internet of Things” (SIoT), and this is drawing the attention of the scientific community. Smart items in the Internet of Things (IoT) ecosystem can locate relevant services based on the social ties between neighbors. As a result, SIoT displays the interplay between various items as a problem in the context of the social IoT ecosystem. Navigating a network can be difficult because of the number of friends and the complexity of social ties. By identifying difficulties with standard SIoT devices’ interaction with social objects, truthful friend computing (TFC) is a new paradigm for tracing such difficulties by utilising a relationship management component to improve network navigability. The concept of trust management can be useful as a strategy during collaborations among social IoT nodes. As a result, the trustor can use a variety of measures to evaluate a smart object’s trustworthiness. Hence, this article demonstrates the need for the trustor to evaluate the extent to which a given metric has contributed to the overall trust score and illustrates profitability when engaging in a transaction with other nodes. With the help of the SIoT, this paper used a unified fuzzy-based computational technique and a multiple-criteria decision-making approach to evaluate the trust weights. The statistical findings show that the computing of “truthful friends” is the biggest challenge for successful SIoT implementation at the initial level.
43

Lo Giudice, Paolo, Antonino Nocera, Domenico Ursino, and Luca Virgili. "Building Topic-Driven Virtual IoTs in a Multiple IoTs Scenario." Sensors 19, no. 13 (July 4, 2019): 2956. http://dx.doi.org/10.3390/s19132956.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the last years, several attempts to combine the Internet of Things (IoT) and social networking have been made. In the meantime, things involved in IoT are becoming increasingly sophisticated and intelligent, showing a behavior that tends to look like the one of users in social networks. Therefore, it is not out of place to talk about profiles of things and about information and topics exchanged among them. In such a context, constructing topic-driven virtual communities starting from the real ones operating in a Multi-IoT scenario is an extremely challenging issue. This paper aims at providing some contributions in this setting. First of all, it presents the concept of profile of a thing. Then, it introduces the concept of topic-guided virtual IoT. Finally, it illustrates two approaches (one supervised and one unsupervised) to constructing topic-guided virtual IoTs in a Multi-IoT scenario.
44

Минаев, В. А., Б. А. Швырев, and Т. Р. Ромашкин. "INTERNET OF THINGS SECURITY: KEY SOLUTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 26, no. 2(-) (June 30, 2023): 163–68. http://dx.doi.org/10.36622/vstu.2023.26.2.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Одной из основных проблем при обеспечении безопасности Интернета вещей (IoT) является, с одной стороны, огромное количество устройств, масштабирующее угрозы и риски безопасности их использования, а с другой – слабая разработанность или даже отсутствие стандартизированных протоколов безопасности. Нередко устройства IoT имеют ограниченную вычислительную мощность и память в угоду цене и коммерческой выгоде, что затрудняет реализацию надежных мер безопасности. Расширение IoT достигло критической инфраструктуры - системы здравоохранения, транспорта и других особо важных отраслей. Поскольку современные устройства IoT имеют доступ к персональной и конфиденциальной информации, нарушения их информационной безопасности могут иметь весьма серьезные последствия, поэтому крайне важно обосновать и реализовать надежные меры безопасности для их защиты от компьютерных атак. Проводится сравнительный анализ основных сетевых протоколов IoT. Выделяются наиболее вероятные компьютерные атаки на устройства IoT: нарушение безопасности сети, нарушение безопасности устройства, физический доступ к устройству, сбои в работе устройства, технологии социальной инженерии. Рассматриваются следующие меры для обеспечения безопасности устройств IoT: совершенствование нормативно-правовой базы; обучение и повышение квалификации сотрудников; развитие взаимодействия с производителями IoT; улучшение мониторинга IoT-устройств; улучшение методов анализа данных, связанных с функционированием IoT. Для реализации предложенных мер приводятся программные и аппаратные решения задач безопасности IoT-устройств. One of the main problems in ensuring the security of the Internet of Things (IoT) is, on the one hand, a huge number of devices that scale the threats and security risks of their use, and on the other hand, weak development or even lack of standardized security protocols. Often, IoT devices have limited computing power and memory for the sake of price and commercial benefits, which makes it difficult to implement reliable security measures. The expansion of IoT has reached critical infrastructure - healthcare, transport and other particularly important areas. Since modern IoT devices have access to personal and confidential information, violations of their information security can have very serious consequences, therefore it is extremely important to justify and implement reliable security measures to protect them from computer attacks. A comparative analysis of the main IoT network protocols is carried out. The most likely computer attacks on IoT devices are highlighted: network security violation, device security violation, physical access to the device, device malfunctions, social engineering technologies. The following measures to ensure the security of IoT devices are considered: improvement of the regulatory and legal framework; training and professional development of employees; development of interaction with IoT manufacturers; improvement of monitoring of IoT devices; improvement of data analysis methods related to the functioning of IoT. To implement the proposed measures, software and hardware solutions to the security problems of IoT devices are provided.
45

Chatterjee, Sheshadri, and Arpan Kumar Kar. "Regulation and governance of the Internet of Things in India." Digital Policy, Regulation and Governance 20, no. 5 (August 13, 2018): 399–412. http://dx.doi.org/10.1108/dprg-04-2018-0017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose The purpose of this study is to highlight the importance of Internet of Things (IoT) in India. The purpose also includes providing insights regarding policy framing for IoTs with a focus on regulation and governance. Design/methodology/approach A qualitative approach has been taken here for understanding the issues of IoT policy for India so far as regulations and governance are concerned. Findings This study highlights that the draft IoT policy of India, 2015 is to be improved. Attention is to be focused on regulation and governance for addressing security and privacy issues among other issues. For proper enablement of IoT technology, arrangements of funds are essential. Research limitations/implications IoT-related technologies in India have immense potential for the industries. This study implies the importance of security and privacy issues. If these issues are properly addressed, the industries will flourish further. Practical implications The study provides insights covering how usage of IoT technology would help the industry to grow up, how research and development organizations would be able to strengthen IoT technology for further development and to what extent it will improve the human daily activities. Social implications IoT would influence lives of millions of people of India. IoT-related policies would have huge social implication in terms of human–device interactions and communications. This research is a contemporary study on the implication of IoT policy toward the future growth of IoT-enabled devices in India. Originality/value The Government of India is expected to frame a comprehensive IoT policy with the help of draft IoT policy of 2015. This paper has taken a unique attempt to provide effective inputs to develop a comprehensive IoT policy for India.
46

Rabeah Md Zin. "Unraveling the Dynamics of User Acceptance on the Internet of Things: A Systematic Literature Review on the Theories and Elements of Acceptance and Adoption." Journal of Electrical Systems 20, no. 4s (April 8, 2024): 2217–27. http://dx.doi.org/10.52783/jes.2392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) connects various devices to the internet, enabling seamless communication and coordination. Its sensor and action capabilities aid in early fire detection and response. This article investigates the theory and elements of Internet of Things (IoT) acceptance and acceptance to see how IoT can assist in monitoring and controlling fire safety management. This study uses a systematic literature review (SLR) methodology to search, identify, appraise, synthesize, analyze, and summarize studies on the Internet of Things (IoT). The study highlights the importance of theoretical frameworks like TPB, TAM, UTAUT, and TOE in understanding the Internet of Things (IoT) acceptance and adoption. TPB focuses on attitudes, subjective standards, and perceived behavioral control, TAM emphasizes ease of use, UTAUT focuses on performance expectancy, effort expectancy, social influence, and facilitating conditions, and TOE examines organizational, technological, and environmental aspects affecting commercial IoT adoption. These frameworks provide actionable insights for successful IoT implementation and integration in individual and organizational settings.
47

Faryad, Shagufta, Hira Batool, Muhammad Asif, and Affan Yasin. "Impact of Internet of Things (IoT) as Persuasive Technology." International Journal of Information Technology and Computer Science 13, no. 6 (December 8, 2021): 16–28. http://dx.doi.org/10.5815/ijitcs.2021.06.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) adds a new dimension to how people and things can communicate and collaborate. Society and the Internet are now being interconnected tightly and purposely. The research aims to analyze how IoT as a persuasive technology can affect human behavior and increase the awareness and effectiveness of IoT products among users. How will the Internet of Things infrastructure facilitate humans to change their attitudes and behaviors towards specific routine work? Our objective is to analyze which factors influence the acceptance and rejection of particular behaviors and the core motivators that persuade people to do something or to avoid something. We aim to determine whether IoT will facilitate humans to change their focused behaviors or not. Because of the rapid convergence of digital and physical worlds and the advent of digital technology, the Internet and social media have opened up a new world of affordances, constraints, and information flows from a design perspective. This article discusses how digital architecture affects behavior and the ramifications for designers who want to influence behavior for social and environmental good. In this paper we aim to give a brief introduction to persuasive technology, especially as it pertains to human adoption of IoT technology. We discuss a number of current research opportunities in IoT gadgets and their adoptions [1]. Our results indicate that persuasive (IoT) infrastructure can be expected to achieve a change of driving behaviour among their adopters. Furthermore, attention should be paid to an appropriate selection and implementation of persuasive strategies.
48

Danubianu, Mirela, Cristian Teodorescu, and Isabela Corneanu. "Internet of Things and the Environment." Present Environment and Sustainable Development 13, no. 1 (June 1, 2019): 181–90. http://dx.doi.org/10.2478/pesd-2019-0014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Along with the well-known attributes of mankind's future (sustainable, socially inclusive, environmentally-friendly), the last few years we was witnessing the appearance of a new digital attribute. The Internet of Things (IoT) is the ongoing digital revolution that attempts to put into practice all the benefits of explosive development of digital technologies and associated communication capabilities. The huge amount of information collected by computerized planning, production management, technology risk practice and health hazards monitoring has to serve both economic development, advanced management resources, financial profit, and a better protected environment. The IoT Revolution is in its early stages and its focus is on assuring the associated infrastructure as quickly as possible (hardware, BigData software, sensor systems, protected sensitive data, safe communications). The first results are expected in optimizing and streamlining technologies in the management of non-renewable resources. It is appreciated that by 2030, the value added by IoT will amount to about $14 trillion in industry alone. But it would be a mistake to stop the benefits of IoT there. The authors devise a SWOT (Strength, Weakness, Opportunities and Traits) analysis, and evaluate the benefits and risks of aligning environmental/social policies to the IoT, proposing a brevity of measures to ensure that the sustainability is considered in the IoT implementation at all stages and at all levels: enterprise, industrial, geographical area, global region. The IoT vision and mission are presented in light of this approach, strategic objectives and important action directions. It also highlights the ethical issues related to the development of an interconnected world through IoT (where unrestrained access to information is stopped, who and for whose control this access has been made, etc.). The terms IoE (Internet of Environment) and IoS (Internet of Sustainability) are suggested.
49

Rifat-Ibn-Alam, Nyme Ahmed, Syed Nafiul Shefat, and Dr Md Taimur Ahad. "Keep Me In Distance: An Internet Of Things Based Social Distance Monitoring System In Covid19." International Journal of Advanced Networking and Applications 13, no. 05 (2022): 5128–33. http://dx.doi.org/10.35444/ijana.2022.13506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Despite, the fact, the observable benefits of the Internet of things (IoT) have been expanded tohealthcare for automation, very few studies have been shed light on the wearable IoT to keep distance from human to human. In the Coviid'19 situation, in general, it is advisable to keep a social distance to avoid the possibility of infection. Research from Wearable IoT sensor-based healthcare, IoT provides a pathway how citizens can keep them ata distance as IoT offers a myriad of sensors. Realizing the practical problem, in this research a social distance model is developed using wearable IoT. This proposed technique is easily implementable on wearable devices. Our proposed system is cost-effective, which is expected very suitable for the low-income regions of the world to monitor appropriate social distance.
50

Kovalenko, O. Ye. "Security models of the Internet of Things." Mathematical machines and systems 4 (2023): 43–50. http://dx.doi.org/10.34121/1028-9763-2023-4-43-50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The IoT is a cyber-convergent system that includes things, means of communication, target ap-plications, and data analysis tools that support the unique identification of each object. IoT technologies play a vital role in the creation of cyber-convergent systems due to their wide us-age in various spheres of life such as industry, social sphere, health care, and creating a com-fortable environment. The IoT security model method ensures the confidentiality, integrity, and availability of data that is transferred between devices and also guarantees the privacy and secu-rity of end users. The creation and use of IoT systems directly affect the security and privacy of the involved and connected components. The presented study introduces an analysis of IoT ar-chitecture models with end-to-end security support. The conducted literature review reveals the challenges of various aspects of security faced by the IoT environment. Some models imple-menting different security strategies at different layers of the IoT are described. These include the perception layer which provides the authentication process for identifying IoT entities, the network layer which focuses on the security processes of cloud platforms, and the application layer which provides authentication and authorization for end users. The results of the analysis show that building secure IoT systems is based on three main strategies: proper configuring and ensuring the protection of all IoT devices; using secure wireless networks to connect IoT devic-es to corporate or global networks; constant situational awareness of security threats to IoT de-vices; and implementing appropriate security solutions to protect them from attacks. The ma-turity model of the IoT security system based on the ISA/IEC 62443 document package is also described.

To the bibliography