SlideShare a Scribd company logo
CLARIFYING TRUST IN SOCIAL
INTERNET OF THINGS
By Aditya Nath
MEANING OF ‘SOCIAL’
• Internet of Things
• More connections  Increased smartness
• Turn towards Social approach
• Example
GENERAL TRUST MODEL
Trustor Trustee Goal
1. Mutual Trustworthiness
2. Decision making Action
Expected result.
No malicious use of resources.
Increased trust
Unexpected result
Damage to the output
Cost of operation
Context
THE FIVE ASPECTS OF TRUST AMONG
SOCIAL IOT
• Mutuality of Trust
• Inferential Task Trust Transfer
• Transitivity of Trust
• Trustworthiness Update based on previous results
EXPERIMENT SETUP
• 5 groups of IoT devices, each comprising of:
• 2 Trustors
• 2 Honest Trustees
• 2 Dishonest Trustees
• A coordinating machine – receives data from every group and relays it to the
host machine.
• Network model chosen from Facebook, Google+ and Twitter.
• Dataset contains user profile and respective user circle.
BIDIRECTIONAL TRUST MODEL
INFERENTIAL TRANSFER OF TRUST IN
TRUST MODEL
GPS
Satellite Image
Real Time Traffic
Alice Brad
TRANSITIVITY IN TRUST MODEL
TRUSTWORTHINESS WITH PREVIOUS
DELEGATION RESULTS
Trustor is tasked with finding the right
trustee based on two strategies:
• Evaluate the success rate of each of
its registered trustee and delegate
task.
• Evaluate the gain, damage and cost
of each trustee before delegating
task.
CONCLUSION
• The proposed methods of interaction also increase the net profits of the
users and make network agents quickly adapt to a changing
environment.
• Malicious behavior is isolated according to this model
• Finally, the calculation of the trustworthiness in our model considers the
dynamic environment.
REFERENCES
• Zhiting Lin, Liang Dong, “Clarifying Trust in Social Internet of Things”, IEEE
Transactions on Knowledge and Data Engineering, Volume: 30 , Issue: 2 , Feb. 1 2018
• L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social Internet of Things (SIoT)—when
social networks meet the Internet of Things: Concept, architecture and network
characterization,” Comput. Netw., vol. 56, no. 16, pp. 3594–3608, Nov. 2012.
• L. Atzori, A. Iera, and G. Morabito, “From “smart objects” to “social objects”: The next
evolutionary step of the Internet of Things,” IEEE Commun. Mag., vol. 52, no. 1, pp. 97–
105, Jan. 2014.
• M. Nitti, L. Atzori, and I. P. Cvijikj, “Friendship selection in the social Internet of Things:
Challenges and possible strategies,” IEEE Internet Things J., vol. 2, no. 3, pp. 240–247,
Jun. 2015.
• Z. Yan, P. Zhang, and A. V. Vasilakos, “A survey on trust management for Internet of
Things,” J. Netw. Comput. Appl., vol. 42, pp. 120–134, Jun. 2014.
QUESTIONS
• Describe the inferential trustworthiness of task among two participants.
• Give the difference between transitivity of trust and inferential transfer
of trust.

More Related Content

What's hot

Powering the Intelligent Enterprise
Powering the Intelligent EnterprisePowering the Intelligent Enterprise
Powering the Intelligent Enterprise
Christine Connors
 
Internet of things
Internet of thingsInternet of things
Internet of things
Pallavi Gupta
 
From Smart Objects to Social Objects
From Smart Objects to Social ObjectsFrom Smart Objects to Social Objects
From Smart Objects to Social Objects
Mohammed Rashid Hussain
 
Research issues in IoT for education
Research issues in IoT for educationResearch issues in IoT for education
Research issues in IoT for education
Radouane Mrabet
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
Ahmed Banafa
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
Ahmed Banafa
 
IoTest project: Semantic interoperability
IoTest project: Semantic interoperabilityIoTest project: Semantic interoperability
IoTest project: Semantic interoperability
iotest
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
Jatin Akar
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012
Charith Perera
 
Internet of things
Internet of thingsInternet of things
Internet of things
K.Mohamed Faizal
 
Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...
Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...
Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...
Rebecca Nathanson
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK Project
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs
Ahmed Banafa
 
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013 COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
Charith Perera
 

What's hot (17)

Powering the Intelligent Enterprise
Powering the Intelligent EnterprisePowering the Intelligent Enterprise
Powering the Intelligent Enterprise
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
From Smart Objects to Social Objects
From Smart Objects to Social ObjectsFrom Smart Objects to Social Objects
From Smart Objects to Social Objects
 
Research issues in IoT for education
Research issues in IoT for educationResearch issues in IoT for education
Research issues in IoT for education
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
IoT and Blockchain Convergence
IoT and Blockchain ConvergenceIoT and Blockchain Convergence
IoT and Blockchain Convergence
 
IoTest project: Semantic interoperability
IoTest project: Semantic interoperabilityIoTest project: Semantic interoperability
IoTest project: Semantic interoperability
 
Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012ACC-2012, Bangalore, India, 28 July, 2012
ACC-2012, Bangalore, India, 28 July, 2012
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...
Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...
Partnering with Tech: Insights from a Planner inside a Tech Consulting Compan...
 
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human Computation
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs How Artificial Intelligence Will Kickstart the Internet of Thnigs
How Artificial Intelligence Will Kickstart the Internet of Thnigs
 
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013 COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
COLLABORATECOM-2013, Austin, Texas, United States, 20 October 2013
 

Similar to Clarifying trust model in Social Internet of Things

IoT in Social Media
IoT in Social MediaIoT in Social Media
IoT in Social Media
BharathKumar (BK) Inbasekaran
 
IoTA
IoTAIoTA
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social Network
Setareh Sarachi, MSc.
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
Michael Muller
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
Justin Grammens
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
ifi8106tlu
 
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdf
Jayanthi Kannan MK
 
Introduction to Internet of Things
 Introduction to Internet of Things Introduction to Internet of Things
Introduction to Internet of Things
Jayanthi Kannan MK
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
Semyon Teplisky
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Lauri Eloranta
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
PiyushRanjan269184
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoT
Abhishek Das
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
Davide Nardone
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital age
Togar Simatupang
 
01-introduction.ppt the paper that you can unless you want to join me because...
01-introduction.ppt the paper that you can unless you want to join me because...01-introduction.ppt the paper that you can unless you want to join me because...
01-introduction.ppt the paper that you can unless you want to join me because...
teodroscampaus
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
HakkemB
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
Vishakha Kumar
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis
Jari Jussila
 

Similar to Clarifying trust model in Social Internet of Things (20)

IoT in Social Media
IoT in Social MediaIoT in Social Media
IoT in Social Media
 
IoTA
IoTAIoTA
IoTA
 
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social Network
 
Contextual Biometrics
Contextual BiometricsContextual Biometrics
Contextual Biometrics
 
Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)Exploring social theory through enterprise social media (muller, ibm research)
Exploring social theory through enterprise social media (muller, ibm research)
 
The Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its ApplicationsThe Internet of Things - What It Is, Where Its Headed and Its Applications
The Internet of Things - What It Is, Where Its Headed and Its Applications
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf1 Unit 1  Introduction _IOT  by Dr.M.K.Jayanthi Kannan (1).pdf
1 Unit 1 Introduction _IOT by Dr.M.K.Jayanthi Kannan (1).pdf
 
Introduction to Internet of Things
 Introduction to Internet of Things Introduction to Internet of Things
Introduction to Internet of Things
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
Ethical and Legal Issues in Computational Social Science - Lecture 7 in Intro...
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
 
Clarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal PresentationClarkson - Joshua White - Research Proposal Presentation
Clarkson - Joshua White - Research Proposal Presentation
 
1. Introduction to IoT
1. Introduction to IoT1. Introduction to IoT
1. Introduction to IoT
 
Internet of Things: Research Directions
Internet of Things: Research DirectionsInternet of Things: Research Directions
Internet of Things: Research Directions
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital age
 
01-introduction.ppt the paper that you can unless you want to join me because...
01-introduction.ppt the paper that you can unless you want to join me because...01-introduction.ppt the paper that you can unless you want to join me because...
01-introduction.ppt the paper that you can unless you want to join me because...
 
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffgsummaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
summaryg.pdffgdfgdfgfgfgfgfgffgfdfgfgffg
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
 
Big social data analytics - social network analysis
Big social data analytics - social network analysis Big social data analytics - social network analysis
Big social data analytics - social network analysis
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Clarifying trust model in Social Internet of Things

  • 1. CLARIFYING TRUST IN SOCIAL INTERNET OF THINGS By Aditya Nath
  • 2. MEANING OF ‘SOCIAL’ • Internet of Things • More connections  Increased smartness • Turn towards Social approach • Example
  • 3. GENERAL TRUST MODEL Trustor Trustee Goal 1. Mutual Trustworthiness 2. Decision making Action Expected result. No malicious use of resources. Increased trust Unexpected result Damage to the output Cost of operation Context
  • 4. THE FIVE ASPECTS OF TRUST AMONG SOCIAL IOT • Mutuality of Trust • Inferential Task Trust Transfer • Transitivity of Trust • Trustworthiness Update based on previous results
  • 5. EXPERIMENT SETUP • 5 groups of IoT devices, each comprising of: • 2 Trustors • 2 Honest Trustees • 2 Dishonest Trustees • A coordinating machine – receives data from every group and relays it to the host machine. • Network model chosen from Facebook, Google+ and Twitter. • Dataset contains user profile and respective user circle.
  • 7. INFERENTIAL TRANSFER OF TRUST IN TRUST MODEL GPS Satellite Image Real Time Traffic Alice Brad
  • 9.
  • 10. TRUSTWORTHINESS WITH PREVIOUS DELEGATION RESULTS Trustor is tasked with finding the right trustee based on two strategies: • Evaluate the success rate of each of its registered trustee and delegate task. • Evaluate the gain, damage and cost of each trustee before delegating task.
  • 11. CONCLUSION • The proposed methods of interaction also increase the net profits of the users and make network agents quickly adapt to a changing environment. • Malicious behavior is isolated according to this model • Finally, the calculation of the trustworthiness in our model considers the dynamic environment.
  • 12. REFERENCES • Zhiting Lin, Liang Dong, “Clarifying Trust in Social Internet of Things”, IEEE Transactions on Knowledge and Data Engineering, Volume: 30 , Issue: 2 , Feb. 1 2018 • L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social Internet of Things (SIoT)—when social networks meet the Internet of Things: Concept, architecture and network characterization,” Comput. Netw., vol. 56, no. 16, pp. 3594–3608, Nov. 2012. • L. Atzori, A. Iera, and G. Morabito, “From “smart objects” to “social objects”: The next evolutionary step of the Internet of Things,” IEEE Commun. Mag., vol. 52, no. 1, pp. 97– 105, Jan. 2014. • M. Nitti, L. Atzori, and I. P. Cvijikj, “Friendship selection in the social Internet of Things: Challenges and possible strategies,” IEEE Internet Things J., vol. 2, no. 3, pp. 240–247, Jun. 2015. • Z. Yan, P. Zhang, and A. V. Vasilakos, “A survey on trust management for Internet of Things,” J. Netw. Comput. Appl., vol. 42, pp. 120–134, Jun. 2014.
  • 13. QUESTIONS • Describe the inferential trustworthiness of task among two participants. • Give the difference between transitivity of trust and inferential transfer of trust.