P2P computing for trusted networking of personalized IoT services

被引:5
|
作者
Kim, Dae-Young [1 ]
Lee, Ahyoung [2 ]
Kim, Seokhoon [3 ]
机构
[1] Daegu Catholic Univ, Sch IT Engn, Gyongsan, South Korea
[2] Univ South Dakota, Dept Comp Sci, Vermillion, SD USA
[3] Soonchunhyang Univ, Dept Comp Software Engn, Asan, South Korea
基金
新加坡国家研究基金会;
关键词
Intelligent system; Trusted P2P networking; IoT; Personalized service; Machine learning; THINGS IOT; INTERNET;
D O I
10.1007/s12083-019-00737-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the development of Internet of Things (IoT) technology has enabled various forms of intelligent services to be provided personalized intelligent services are provided for each person based on the data collected from IoT devices through P2P networking. Intelligent IoT services are gradually expanding. However, there can be various security risks in the devices that make up IoT networking. Untrusted devices can affect personalized IoT services by distorting personal information in analyzing the collected data. Therefore, services by the untrusted devices should be restricted. In this paper, the reliability is defined as the familiarity score, which is determined by the connection experience of the devices in a P2P IoT network. The IoT network composed of devices with high familiarity scores can be defined as a trusted area. In the trusted area, data generated by all devices is used to create knowledge for personalized intelligent services for users. In contrast, personalized intelligent services in untrusted area are restricted. Data generated by untrusted devices is classified by a learning algorithm such as logistic regression; thus, bad data is blocked by a gateway to avoid information distortion in data analysis for personalized intelligent services. The proposed method provides a trusted networking environment to IoT service users and protects data integrity. Thus, it can improve the user's quality of experience (QoE) for personalized intelligent services. The proposed approach is evaluated by computer simulation and its superiority is validated.
引用
收藏
页码:601 / 609
页数:9
相关论文
共 50 条
  • [21] P2P networking based internet of things (IoT) sensor node authentication by Blockchain
    Sunghyuck Hong
    Peer-to-Peer Networking and Applications, 2020, 13 : 579 - 589
  • [22] P2P networking based internet of things (IoT) sensor node authentication by Blockchain
    Hong, Sunghyuck
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (02) : 579 - 589
  • [23] P2P computing systems
    Lui, JCS
    Rubenstein, D
    Misra, V
    PERFORMANCE EVALUATION, 2006, 63 (03) : 147 - 148
  • [24] A collaborated computing system by web services based P2P architecture
    Tsai, Min-Jen
    Wang, Chen-Sheng
    Yang, Po-Yu
    Yang, Chien-Yu
    COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN II, 2006, 3865 : 194 - 204
  • [25] Robust P2P Personalized Learning
    Boubouh, Karim
    Boussetta, Amine
    Benkaouz, Yahya
    Guerraoui, Rachid
    2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020), 2020, : 299 - 308
  • [26] P2P cloud network services for IoT based disaster situations information
    Chung, Kyungyong
    Park, Roy C.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (03) : 566 - 577
  • [27] P2P cloud network services for IoT based disaster situations information
    Kyungyong Chung
    Roy C. Park
    Peer-to-Peer Networking and Applications, 2016, 9 : 566 - 577
  • [28] Trusted P2P transactions with fuzzy reputation aggregation
    Song, SS
    Hwang, K
    Zhou, RF
    Kwok, YK
    IEEE INTERNET COMPUTING, 2005, 9 (06) : 24 - 34
  • [29] Distributed hybrid P2P networking systems
    Han, Jungsoo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 555 - 556
  • [30] Distributed hybrid P2P networking systems
    Jungsoo Han
    Peer-to-Peer Networking and Applications, 2015, 8 : 555 - 556