P2P computing for trusted networking of personalized IoT services
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Dae-Young | - |
dc.contributor.author | Lee, Ahyoung | - |
dc.contributor.author | Kim, Seokhoon | - |
dc.date.accessioned | 2021-08-11T08:37:25Z | - |
dc.date.available | 2021-08-11T08:37:25Z | - |
dc.date.issued | 2020-03 | - |
dc.identifier.issn | 1936-6442 | - |
dc.identifier.issn | 1936-6450 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/3053 | - |
dc.description.abstract | As the development of Internet of Things (IoT) technology has enabled various forms of intelligent services to be provided personalized intelligent services are provided for each person based on the data collected from IoT devices through P2P networking. Intelligent IoT services are gradually expanding. However, there can be various security risks in the devices that make up IoT networking. Untrusted devices can affect personalized IoT services by distorting personal information in analyzing the collected data. Therefore, services by the untrusted devices should be restricted. In this paper, the reliability is defined as the familiarity score, which is determined by the connection experience of the devices in a P2P IoT network. The IoT network composed of devices with high familiarity scores can be defined as a trusted area. In the trusted area, data generated by all devices is used to create knowledge for personalized intelligent services for users. In contrast, personalized intelligent services in untrusted area are restricted. Data generated by untrusted devices is classified by a learning algorithm such as logistic regression; thus, bad data is blocked by a gateway to avoid information distortion in data analysis for personalized intelligent services. The proposed method provides a trusted networking environment to IoT service users and protects data integrity. Thus, it can improve the user's quality of experience (QoE) for personalized intelligent services. The proposed approach is evaluated by computer simulation and its superiority is validated. | - |
dc.format.extent | 9 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | Springer Pub. Co., | - |
dc.title | P2P computing for trusted networking of personalized IoT services | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1007/s12083-019-00737-z | - |
dc.identifier.scopusid | 2-s2.0-85062996563 | - |
dc.identifier.wosid | 000518495200015 | - |
dc.identifier.bibliographicCitation | Peer-to-Peer Networking and Applications, v.13, no.2, pp 601 - 609 | - |
dc.citation.title | Peer-to-Peer Networking and Applications | - |
dc.citation.volume | 13 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 601 | - |
dc.citation.endPage | 609 | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | THINGS IOT | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordAuthor | Intelligent system | - |
dc.subject.keywordAuthor | Trusted P2P networking | - |
dc.subject.keywordAuthor | IoT | - |
dc.subject.keywordAuthor | Personalized service | - |
dc.subject.keywordAuthor | Machine learning | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(31538) 22, Soonchunhyang-ro, Asan-si, Chungcheongnam-do, Republic of Korea+82-41-530-1114
COPYRIGHT 2021 by SOONCHUNHYANG UNIVERSITY ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.