Synonyms
Historical Background
Internet of Things (IoT) has been an integral component of our lives and thriving with new products and services. This term was first introduced by Kevin Ashton at Procter & Gamble (P&G) in 1999 (Ashton et al., 2009). He presented the idea that computers could be empowered to observe, identify, and understand the physical world with RFID (radio-frequency identification) and sensor technology. By now, this definition has evolved continually with the development of embedded systems, wireless sensor networks, machine learning, etc. As defined in ITU (2012), IoT is the network of interconnecting physical and virtual things which have embedded information and communication technologies that allow these things to interact and exchange data. In addition to the personal devices such as smartphones, tablets, and laptops, IoT objects have been widely used in others fields which include, but not restricted to, agriculture (Mekala...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Afzal B, Umair M, Shah GA, Ahmed E (2019) Enabling IoT platforms for social IoT applications: vision, feature mapping, and challenges. Futur Gener Comput Syst 92:718–731
Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28
Arasteh H, Hosseinnezhad V, Loia V, Tommasetti A, Troisi O, Shafie-Khah M, Siano P (2016) IoT-based smart cities: a survey. In: 2016 IEEE 16th international conference on environment and electrical engineering (EEEIC). IEEE, pp 1–6
Ashton K et al (2009) That “internet of things” thing. RFID J 22(7):97–114
Atzori L, Iera A, Morabito G (2011) Siot: giving a social structure to the internet of things. IEEE Commun Lett 15(11):1193–1195
Atzori L, Iera A, Morabito G, Nitti M (2012) The social internet of things (siot)–when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw 56(16):3594–3608
Atzori L, Iera A, Morabito G (2014) From “smart objects” to “social objects”: the next evolutionary step of the internet of things. IEEE Commun Mag 52(1): 97–105
Berman F, Cerf VG (2017) Social and ethical behavior in the internet of things. Commun ACM 60(2):6–7
Boyd DM, Ellison NB (2007) Social network sites: definition, history, and scholarship. J Comput-Mediat Commun 13(1):210–230
Diro AA, Chilamkurti N (2018) Distributed attack detection scheme using deep learning approach for internet of things. Futur Gener Comput Syst 82:761–768
FDA (2017) Cybersecurity vulnerabilities identified in st. jude medical’s implantable cardiac devices and merlin@home transmitter: FDA safety communication. https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-identified-st-jude-medicals-implantable-cardiac-devices-and-merlinhome
Fu Z, Lin J, Li Z, Du W, Zhang J, Ye S (2017) Intelligent painting based on social internet of things. In: International conference on distributed, ambient, and pervasive interactions. Springer, pp 335–346
Goodin D (2016) Record-breaking DDoS reportedly delivered by > 145k hacked cameras. Ars Technica 28. https://arstechnica.com/?post_type=post&p=966459 Accessed 10 February 2019
Guinard D, Fischer M, Trifa V (2010) Sharing using social networks in a composable web of things. In: PerCom workshops, pp 702–707
Gul S, Asif M, Ahmad S, Yasir M, Majid M, Malik M, Arshad S (2017) A survey on role of internet of things in education. Int J Comput Sci Netw Secur 17(5): 159–165
Gulati N, Kaur PD (2019) When things become friends: a semantic perspective on the social internet of things. In: Smart innovations in communication and computational sciences. Springer, pp 149–159
ITU (2012) Overview of the internet of things. http://handle.itu.int/11.1002/1000/11559
Jain B, Brar G, Malhotra J, Rani S, Ahmed SH (2018) A cross layer protocol for traffic management in social internet of vehicles. Futur Gener Comput Syst 82: 707–714
Jia Y, Xiao Y, Yu J, Cheng X, Liang Z, Wan Z (2018) A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT. In: IEEE INFOCOM 2018-IEEE conference on computer communications. IEEE, pp 1493–1501
Joyia GJ, Liaqat RM, Farooq A, Rehman S (2017) Internet of medical things (ioMT): applications, benefits and future challenges in healthcare domain. J Commun 12:240–247
Liang Y, Cai Z, Yu J, Han Q, Li Y (2018) Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw 32(4): 8–14
Mekala MS, Viswanathan P (2017) A survey: smart agriculture IoT with cloud computing. In: 2017 international conference on microelectronic devices, circuits and systems (ICMDCS). IEEE, pp 1–7
Mendes P (2011) Social-driven internet of connected objects. IAB workshop on interconnecting smart objects with the internet
Nitti M, Girau R, Atzori L (2014) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253–1266
Ortiz AM, Hussein D, Park S, Han SN, Crespi N (2014) The cluster between internet of things and social networks: review and research challenges. IEEE Internet Things J 1(3):206–215
Rouse M (2015) What is car hacking? Definition from whatis.com. https://internetofthingsagenda.techtarget.com/definition/car-hacking
Whittaker Z (2015) New security flaws found in popular IoT baby monitors. https://www.zdnet.com/article/security-vulnerability-flaw-internet-things-baby-monitors
Wu J, Dong M, Ota K, Liang L, Zhou Z (2015) Securing distributed storage for social internet of things using regenerating code and blom key agreement. Peer-to-Peer Netw Appl 8(6):1133–1142
Yang C, Shen W, Wang X (2018) The internet of things in manufacturing: key issues and potential applications. IEEE Syst Man Cybern Mag 4(1):6–15
Zheng L, Zhang H, Han W, Zhou X, He J, Zhang Z, Gu Y, Wang J et al (2011) Technologies, applications, and governance in the internet of things. Internet of things-global technological and societal trends From smart environments and spaces to green ICT
Zheng X, Cai Z, Li Y (2018) Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun Mag 56(9):55–61
Zhou R, Zhang X, Du X, Wang X, Yang G, Guizani M (2018) File-centric multi-key aggregate keyword searchable encryption for industrial internet of things. IEEE Trans Ind Inform 14(8):3648–3658
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this entry
Cite this entry
Zhang, C., Wang, Y. (2020). Applications and Architectures of Social Internet of Things. In: Shen, X.(., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-78262-1_341
Download citation
DOI: https://doi.org/10.1007/978-3-319-78262-1_341
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78261-4
Online ISBN: 978-3-319-78262-1
eBook Packages: Computer ScienceReference Module Computer Science and Engineering