P2P computing for trusted networking of personalized IoT services

被引:5
|
作者
Kim, Dae-Young [1 ]
Lee, Ahyoung [2 ]
Kim, Seokhoon [3 ]
机构
[1] Daegu Catholic Univ, Sch IT Engn, Gyongsan, South Korea
[2] Univ South Dakota, Dept Comp Sci, Vermillion, SD USA
[3] Soonchunhyang Univ, Dept Comp Software Engn, Asan, South Korea
基金
新加坡国家研究基金会;
关键词
Intelligent system; Trusted P2P networking; IoT; Personalized service; Machine learning; THINGS IOT; INTERNET;
D O I
10.1007/s12083-019-00737-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the development of Internet of Things (IoT) technology has enabled various forms of intelligent services to be provided personalized intelligent services are provided for each person based on the data collected from IoT devices through P2P networking. Intelligent IoT services are gradually expanding. However, there can be various security risks in the devices that make up IoT networking. Untrusted devices can affect personalized IoT services by distorting personal information in analyzing the collected data. Therefore, services by the untrusted devices should be restricted. In this paper, the reliability is defined as the familiarity score, which is determined by the connection experience of the devices in a P2P IoT network. The IoT network composed of devices with high familiarity scores can be defined as a trusted area. In the trusted area, data generated by all devices is used to create knowledge for personalized intelligent services for users. In contrast, personalized intelligent services in untrusted area are restricted. Data generated by untrusted devices is classified by a learning algorithm such as logistic regression; thus, bad data is blocked by a gateway to avoid information distortion in data analysis for personalized intelligent services. The proposed method provides a trusted networking environment to IoT service users and protects data integrity. Thus, it can improve the user's quality of experience (QoE) for personalized intelligent services. The proposed approach is evaluated by computer simulation and its superiority is validated.
引用
收藏
页码:601 / 609
页数:9
相关论文
共 50 条
  • [31] P2P social networking for the rest of US
    Antoniou, Zoe
    Zyto, Sacha
    Kalofonos, Dimitris N.
    PERVASIVE AND MOBILE COMPUTING, 2010, 6 (05) : 512 - 526
  • [32] Efficient IoT resource discovery approach based on P2P networks and Fog Computing
    Zorgati, Hela
    Ben Djemaa, Raoudha
    Amous, Ikram
    INTERNET OF THINGS, 2023, 24
  • [33] Convergence P2P cloud computing
    Jo, Sunmoon
    Han, Jungsoo
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (06) : 1153 - 1155
  • [34] P2P computing for intelligence of things
    Jo, Sunmoon
    Lee, Jieun
    Han, Jungsoo
    Ghose, Supratip
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (02) : 575 - 578
  • [35] P2P computing for intelligence of things
    Sunmoon Jo
    Jieun Lee
    Jungsoo Han
    Supratip Ghose
    Peer-to-Peer Networking and Applications, 2020, 13 : 575 - 578
  • [36] Convergence P2P cloud computing
    Sunmoon Jo
    Jungsoo Han
    Peer-to-Peer Networking and Applications, 2018, 11 : 1153 - 1155
  • [37] P2P computing and interaction with grids
    Iamnitchi, A
    Talia, D
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (03): : 331 - 332
  • [38] P2P Video Streaming Replication Scheme for P2P VoD Services
    Lo, Chi-Wen
    Su, Yi-Yu
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 391 - 393
  • [39] Constructing trusted virtual execution environment in P2P grids
    Zou, Deqing
    Zheng, Weide
    Long, Jinjiu
    Jin, Hai
    Chen, Xueguang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (05): : 769 - 775
  • [40] P2P networking: An information-sharing alternative
    Parameswaran, M
    Susarla, A
    Whinston, AB
    COMPUTER, 2001, 34 (07) : 31 - +