A Social-Relationships-Based Service Recommendation System for SIoT Devices

@article{Khelloufi2021ASS,
  title={A Social-Relationships-Based Service Recommendation System for SIoT Devices},
  author={Amar Khelloufi and Huansheng Ning and Sahraoui Dhelim and Tie Qiu and Jianhua Ma and Runhe Huang and Luigi Atzori},
  journal={IEEE Internet of Things Journal},
  year={2021},
  volume={8},
  pages={1859-1870}
}
Social Internet of Things comes as a new paradigm of Internet of Things to solve the problems of network discovery, navigability, and service composition. It aims to socialize the IoT devices and shape the interconnection between them into social interaction just like human beings. In IoT scenarios, a device can offer multiple services and different devices can offer the same services with different parameters and interest factors. The proliferation of offered services led to difficulties… 
Graph-based service recommendation in Social Internet of Things
TLDR
This work proposes a graph-based service recommendation framework by jointly considering social relationships of heterogeneous objects in Social Internet of Things and user’s preferences, which is very important for many applications such as urban computing, smart cities, and health care.
Advanced Service Search Model for Higher Network Navigation Using Small World Networks
TLDR
This paper proposes a simple model for social networks to discover the object or services by using a small-world network and concludes that the proposed model is efficient and reflects the real network structures of small- world networks, therefore, it can be suitable forsocial networks.
IoT-Enabled Social Relationships Meet Artificial Social Intelligence
TLDR
The role of IoT in social relationships management, the problem of social relationships explosion in IoT, and the proposed solutions using ASI are discussed, including social-oriented machine-learning and deep-learning techniques.
Understanding the Trustworthiness Management in the Social Internet of Things: A Survey
TLDR
A holistic view of trustworthiness management for SIoT is presented, primarily categorizing them into four groups in terms of their strengths, limitations, trust management components employed in each of the referred trust management schemes, and the performance of these studies vis-à-vis numerous trust evaluation dimensions.
NTSC: a novel trust-based service computing scheme in social internet of things
TLDR
A trust evaluation scheme to compute trustworthy for data providers with assistance of trusted static sensor devices in edge computing, that comprehensively computes trustworthy by considering both temporal and quality factors is proposed.
An Agent-Based Model of Task-Allocation and Resource-Sharing for Social Internet of Things
TLDR
An agent-based model for Social Internet of Things is proposed, which features the realization of various interaction modalities, along with possible network structures and mobility modes, thus providing a novel model to ask interesting “what-if” questions.
ComPath: User Interest Mining in Heterogeneous Signed Social Networks for Internet of People
TLDR
A new proximity function that measures the similarity between users based on their interests/disinterests with respect to the relative popularity of these interests/ Disinterests among other users and a greedy community detection algorithm that detects communities of users with common interests with possible overlapping communities using the adaptive clique relaxation technique are proposed.
Personality-Aware Product Recommendation System Based on User Interests Mining and Metapath Discovery
TLDR
Experimental results show that the proposed Meta-Interest method can increase the precision and recall of the recommendation system, especially in cold-start settings.
Enabling Secure Guest Access for Command-and-Control of Internet of Things Devices
TLDR
Using the proposed approach enables not only sharing of data but also permits the external controller to submit moderated requests for actions to be performed, and concludes by examining how this approach could also be adopted to provide secure guest access to connected systems in a domestic or commercial context.
A survey on personality-aware recommendation systems
TLDR
This survey explores the different design choices of personality-aware recommendation systems, by comparing their personality modeling methods, as well as their recommendation techniques.
...
...

References

SHOWING 1-10 OF 30 REFERENCES
Context-Aware Trustworthy Service Evaluation in Social Internet of Things
TLDR
The experiments demonstrate that the proposed contextual trust evaluation model can effectively differentiate honest and dishonest devices and provide a high success rate in selecting the most trustworthy services and providing high resilience against different attacks from dishonest devices.
Testing and evaluating recommendation algorithms in internet of things
TLDR
It is shown that the graph-based recommendation algorithm can be used to develop an effective recommender system for the IoT and that some algorithms perform reasonably well and produce high quality results.
Toward service recommendation in Internet of Things
TLDR
This work proposes a graph-based recommender system that takes into account the unique structure of IoT and introduces the concept of service recommender systems in IoT by a formal model for IoT recommendation.
A Recommendation Model Using the Bandwagon Effect for E-Marketing Purposes in IoT
TLDR
This work considers the bandwagon effects in movie recommendation domain and suggests how to use the bandwagon effect in recommender systems with IoT, and proposes a recommendation model that does not require users’ additional actions and is more suitable for the IoT environment.
Trust Management for SOA-Based IoT and Its Application to Service Composition
TLDR
A novel adaptive filtering technique to determine the best way to combine direct trust and indirect trust dynamically to minimize convergence time and trust estimation bias in the presence of malicious nodes performing opportunistic service and collusion attacks is developed.
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things
TLDR
The concepts of user/service location information and locality-sensitive hashing (LSH) in the domain are introduced and a location-aware recommendation approach with privacy-preservation capability is proposed and results prove the effectiveness and efficiency of the approach.
Recommender system for mobile users
TLDR
A recommender system that socially matches wireless devices to communicate and share their contents based on similarities, distance, velocity, wireless channel quality and remaining energy to overcome the challenges of large-scale mobile IoT.
A Novel Recommender System in IoT
TLDR
A novel recommender system which uses publicly available data about installed apps on smartphones as a source for personalization and builds a digital inventory of physical objects of each user.
...
...