Detailed Information

Cited 0 time in webofscience Cited 6 time in scopus
Metadata Downloads

P2P computing for trusted networking of personalized IoT services

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Dae-Young-
dc.contributor.authorLee, Ahyoung-
dc.contributor.authorKim, Seokhoon-
dc.date.accessioned2021-08-11T08:37:25Z-
dc.date.available2021-08-11T08:37:25Z-
dc.date.issued2020-03-
dc.identifier.issn1936-6442-
dc.identifier.issn1936-6450-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3053-
dc.description.abstractAs the development of Internet of Things (IoT) technology has enabled various forms of intelligent services to be provided personalized intelligent services are provided for each person based on the data collected from IoT devices through P2P networking. Intelligent IoT services are gradually expanding. However, there can be various security risks in the devices that make up IoT networking. Untrusted devices can affect personalized IoT services by distorting personal information in analyzing the collected data. Therefore, services by the untrusted devices should be restricted. In this paper, the reliability is defined as the familiarity score, which is determined by the connection experience of the devices in a P2P IoT network. The IoT network composed of devices with high familiarity scores can be defined as a trusted area. In the trusted area, data generated by all devices is used to create knowledge for personalized intelligent services for users. In contrast, personalized intelligent services in untrusted area are restricted. Data generated by untrusted devices is classified by a learning algorithm such as logistic regression; thus, bad data is blocked by a gateway to avoid information distortion in data analysis for personalized intelligent services. The proposed method provides a trusted networking environment to IoT service users and protects data integrity. Thus, it can improve the user's quality of experience (QoE) for personalized intelligent services. The proposed approach is evaluated by computer simulation and its superiority is validated.-
dc.format.extent9-
dc.language영어-
dc.language.isoENG-
dc.publisherSpringer Pub. Co.,-
dc.titleP2P computing for trusted networking of personalized IoT services-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1007/s12083-019-00737-z-
dc.identifier.scopusid2-s2.0-85062996563-
dc.identifier.wosid000518495200015-
dc.identifier.bibliographicCitationPeer-to-Peer Networking and Applications, v.13, no.2, pp 601 - 609-
dc.citation.titlePeer-to-Peer Networking and Applications-
dc.citation.volume13-
dc.citation.number2-
dc.citation.startPage601-
dc.citation.endPage609-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusTHINGS IOT-
dc.subject.keywordPlusINTERNET-
dc.subject.keywordAuthorIntelligent system-
dc.subject.keywordAuthorTrusted P2P networking-
dc.subject.keywordAuthorIoT-
dc.subject.keywordAuthorPersonalized service-
dc.subject.keywordAuthorMachine learning-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Computer Software Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seok hoon photo

Kim, Seok hoon
College of Software Convergence (Department of Computer Software Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE