Skip to main content
Log in

P2P computing for trusted networking of personalized IoT services

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

As the development of Internet of Things (IoT) technology has enabled various forms of intelligent services to be provided personalized intelligent services are provided for each person based on the data collected from IoT devices through P2P networking. Intelligent IoT services are gradually expanding. However, there can be various security risks in the devices that make up IoT networking. Untrusted devices can affect personalized IoT services by distorting personal information in analyzing the collected data. Therefore, services by the untrusted devices should be restricted. In this paper, the reliability is defined as the familiarity score, which is determined by the connection experience of the devices in a P2P IoT network. The IoT network composed of devices with high familiarity scores can be defined as a trusted area. In the trusted area, data generated by all devices is used to create knowledge for personalized intelligent services for users. In contrast, personalized intelligent services in untrusted area are restricted. Data generated by untrusted devices is classified by a learning algorithm such as logistic regression; thus, bad data is blocked by a gateway to avoid information distortion in data analysis for personalized intelligent services. The proposed method provides a trusted networking environment to IoT service users and protects data integrity. Thus, it can improve the user’s quality of experience (QoE) for personalized intelligent services. The proposed approach is evaluated by computer simulation and its superiority is validated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Atzori L, Iera A, Morabito G (2010) The internet of things: A survey. Comput Netw 54(15):2787–2805

    Article  Google Scholar 

  2. Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  3. Ali S, Qaisar SB, Saeed H, Khan MF, Naeem M, Anpalagan A (2015) Network challenges for cyber physical systems with tiny wireless devices: A case study on reliable pipeline condition monitoring. MDPI Sensors 15(4):7172–7205

    Article  Google Scholar 

  4. Jing W, Miao Q, Chen G (2018) An open scheduling framework for QoS resource management in the internet of things. KSII Trans Internet Inf Syst 12(9):4103–4121

    Google Scholar 

  5. Al-Fuqaha A, Guizani M, Mohammadi M, aledhari M, Ayyash M (2015) Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutorials 17(4):2347–2376

    Article  Google Scholar 

  6. Kim SK, Sahu N, Preda M (2017) Beginning of a new standard: Internet of media things. KSII Trans Internet Inf Syst 11(11):5182–5199

    Google Scholar 

  7. Sinha RS, Wei Y, Hwang SH (2017) A survey on LPWA technology: LoRa and NB-IoT. ICT Express 3(1):14–21

    Article  Google Scholar 

  8. Sohn I, Yoon SW, Lee SH (2018) Distributed scheduling using belief propagation for internet-of-things (IoT) networks. Peer-to-Peer Netw Appl 11(1):152–161

    Article  Google Scholar 

  9. Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: A taxonomy. In: Proc. of international conference on advances in future internet (AFIN), pp 48–54

    Google Scholar 

  10. Hu YC, Patel M, Sabella D, Sprecher N, Young V (2015) Mobile edge computing - a key technology towards 5G. ETSI White Paper (11)

  11. Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: Proc of IEEE International Conference on Intelligent Systems and Control (ISCO)

    Google Scholar 

  12. Mach P, Becvar Z (2017) Mobile edge computing: A survey on architecture and computation offloading. IEEE Commun Surv Tutorials 19(3):1628–1656

    Article  Google Scholar 

  13. Fan K, Wang J, Wang X, Li H, Yang Y (2018) Secure, efficient and revocable data sharing scheme for vehicular fogs. Peer-to-Peer Netw Appl 11(4):766–777

    Article  Google Scholar 

  14. Kim DY, Kim S, Park JH (2017) Remote software update in trusted connection of long range IoT networking integrated with mobile edge cloud. IEEE Access 6:66831–66840. https://doi.org/10.1109/ACCESS.2017.2774239

    Article  Google Scholar 

  15. Kim DY, Kim S, Park JH (2017) A combined network control approach for the edge cloud and LPWAN-based IoT services. Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4406

  16. Sun X, Ansari N (2016) Edge IoT: Mobile edge computing for the internet of things. IEEE Commun Mag 54(12):22–29

    Article  Google Scholar 

  17. Kim DY, Kim S, Hassan H, Park JH (2017) Adaptive data rate control in low power wide area networks for long range IoT service. J Comput Sci 22:171–178

    Article  Google Scholar 

  18. D.Y. Kim, Y.S. Jeong, S. Kim, “Data-filtering system to avoid total data distortion in IoT networking. Symmetry Journal, Vol.9, No.1, ID 16, 2017

    Article  MathSciNet  Google Scholar 

  19. Lin Z, Xiao F, Sun Y, Ma Y, Xing CC, Huang J (2018) A secure encryption-based malware detection system. KSII Trans Internet Inf Syst 12(4):1799–1818

    Google Scholar 

  20. Alsheikh MA, Lin S, Niyato D, Tan HP (2014) Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Commun Surv Tutorials 16(4):1996–2018

    Article  Google Scholar 

  21. Di M, Joo EM (2007) A survey of machine learning in wireless sensor networks form networking and application perspectives. In: Proc of International Conference on Information, Communications & Signal Processing

    Google Scholar 

  22. Goodfellow I, Bengio Y, Courville A (2016) Deep learning. The MIT press, Cambridge

  23. Kim S, Kim DY (2018) Efficient data-forwarding method in delay-tolerant P2P networking for IoT services. Peer-to-Peer Netw Appl 11(6):1176–1185

    Article  Google Scholar 

  24. Tankard C (2015) The security issues of the internet of things. Computer Fraud & Security 2015(9):11–14

    Article  Google Scholar 

  25. C.Y. Chen, M. Hasan, S. Mohan, “Securing real-time internet of things. arXiv preprint arXiv:1705.08489, pp.1-10, 2017, 2018

  26. Ross SM (2002) Probability models for computer science. Harcourt/Academic Press, Orlando

    Google Scholar 

  27. Trivedi KS (2001) Probability and statistics with reliability, queuing and computer science applications. Wiley, Chichester

    MATH  Google Scholar 

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(NRF-2017R1D1A1B03032777), and this work was supported by the Soonchunhyang University Research Fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seokhoon Kim.

Additional information

This article is part of the Topical Collection: Special Issue on P2P Computing for Intelligence of Things

Guest Editors: Sunmoon Jo, Jieun Lee, Jungsoo Han, and Supratip Ghose

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, DY., Lee, A. & Kim, S. P2P computing for trusted networking of personalized IoT services. Peer-to-Peer Netw. Appl. 13, 601–609 (2020). https://doi.org/10.1007/s12083-019-00737-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00737-z

Keywords

Navigation