Trustworthiness management in the social network of things
Our Price
₹3,000.00
10000 in stock
Support
Ready to Ship
Description
The idea that the convergence of the “Internet of Things” and the “Social Networks” worlds, which up to now were mostly kept separate by both scientific and industrial communities, is possible or even advisable is gaining momentum very quickly. This is due to the growing awareness that a “Social Internet of Things” (SIoT) paradigm carries with it many desirable implications in a future world populated by objects permeating the everyday life of human beings. One of the biggest challenges that the research community is facing right now is to be able to organize such an ocean of devices so that the discovery of objects and services is performed efficiently and in a scalable way. Recently, several attempt s have been made to apply concepts of social networking to the IoT. So the system use The Chord software takes the form of a library to be linked with the client and server applications that use it. The application interacts with Chord in two main ways. First, Chord provides a lookup (key) algorithm that yields the IP address of the node responsible for the key. Second, the Chord software on each node notifies the application of changes in the set of keys that the node is responsible for. This allows the application software to, for example, move corresponding values to their new homes when a new node joins. The application using Chord is responsible for providing any desired authentication, caching, replication, and user – friendly naming of data. Chord’s flat key space eases the implementation of these features. RELOAD proposes Chord [10] as its default Distributed Hash Table (DHT) algorithm to organize the overlay. It also has an integrated Network Address Translator (NAT) traversal mechanism, the Interactive Connectivity Establishment (ICE). In a distributed and heterogeneous IoT scenario, this mechanism comes very handy for interconnecting the autonomous devices, which will use whatever communication technology is available. Chord allows for the available peer/resource lookup in no more than log N hops, where N is the total number of the peers in the overlay network. However, as a protocol originally designed for background downloading applications. Firstly, Chord lookup protocol is based on clockwise lookup. It causes high delay when communicating with peers that are in the anti-clockwise direction. Secondly, Chord uses consistent hashing to partition a key space so that each peer is responsible for roughly the same load of resources. Chord is implemented in either iterative or recursive style. However, recursive routing might increase the hop number; and iterative routing might be not efficient in traversing NAT. Fourth, Chord lacks of cache mechanism to preserve the useful information for future session establishment. Chord routes the message by sending messages to the next successor that is nearest to the destination identifier. Therefore, the goal of this thesis is to define a possible architecture for the SIoT, which includes the functionalities required to integrate things into a social network, and the needed strategies to help things to create their relationships in such a way that the resulting social network is navigable. Moreover, it focuses on the trustworthiness management, so that interaction among objects that are friends can be done in a more reliable way and proposes a possible implementation of a SIoT network. The SIoT structure can be shaped as required to guarantee the network navigability, so as that the discovery of objects and services is performed effectively and the scalability is guaranteed like in the human social networks.
Tags: 2014, Data Mining Projects, Java


