A Trust-Aware and Authentication-Based Collaborative Method For Resource Management of Cloud-Edge Computing in Social Internet of Things
A Trust-Aware and Authentication-Based Collaborative Method For Resource Management of Cloud-Edge Computing in Social Internet of Things
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
increases the expansion of relationships between objects in consumption to meet quality requirements in this approach.
the IoT network. The influential criteria in the social relations The rest of this article is organized as follows: The background
of devices at the edge of the IoT network are their past of the S-IoT scenario is reviewed in Section II. In Section III,
interaction, the choice of data processing location, distance, a general model that analyzes S-IoT is presented and the net-
and energy consumption of the devices in the communication work relationships in this model are formulated to evaluate the
system [7]. In the communication of objects, the accuracy system performance, in Section IV. The proposed algorithm
of event detection and the scalability of the system and its for selecting a processor friend is shown in Section V and the
availability while maintaining trust in its performance are operational simulation and presentation of the results are also
important [8]. However, the extent and diversity of devices shown in Section VI. In Section VII; future objectives and
and the area of communication search at the edge of the final points have been discussed.
network are growing rapidly, which, along with the speed of
data growth and the dynamic diversity of the S-IoT environ- II. R ELATED W ORK
ment, has caused more complexity in the interactive model S-IoT is a dense pattern with multiple objects that enable the
of the devices, and it is the complexity of battery energy interaction of heterogeneous elements with multiple features
consumption, which is of great importance. This issue makes and various services in the community of objects. These
it necessary to choose the appropriate task processing position elements include people, objects, or devices that communicate
in the IoT social network. To face the search for a suitable task with communication technologies such as Bluetooth, Wi-Fi,
processing device at the edge of the network, it is important and LoRa. The devices of this social network of things can: 1)
to consider the independent information processing model of interact their interaction automatically or stop communicating
each device, the reliability of the service providers, and the and create a personal network community; 2) process and exe-
interaction history between the edge devices in the network. cute the desired executive programs and services by exploring
For this reason, objects must have the capacity to process the network; and 3) announce their presence together with
data and tasks, the capacity to store data, and the energy other elements of the S-IoT paradigm to provide services [9].
profile of their neighbor friends. The most important challenge Identification of elements in the network includes the behavior
in the social communication of elements at the cloud-edge of objects in terms of location, specifications, and required
layer is the number of neighboring friends, which affects the services provided by them and influenced by various aspects
amount of memory usage, processing energy consumption, of each object such as ownership, throughput, communica-
and service discovery efficiency. Of course, the number of tion bandwidth, processing, and dynamics. The abundance of
friends in each applicable area is related to the communication interaction in the IoT network and especially at the network
scenario. In this research, optimal processing location selection edge facilitates the discovery of common peers at the network
for improving system performance by properly naming among edge. In [10], a new method for designing IoT platforms is
the available devices is presented to process a task and also used as architecture-independent infrastructure that can design
enables network navigation. systems without any knowledge of programming languages or
The existing key contributions of the proposed method are electronics. Chen et al. [8] investigated the trust factor and
shown as follows: criteria such as community benefits, honesty, and cooperation
in social links between IoT devices and their communication
1) designing a communication model of interconnected
with each other dynamically. Interactions between devices are
objects through the exchange of resources and services
updated based on the distributed trust protocol in a communi-
in the IoT social network;
cation session. They also showed a tradeoff in communication
2) detection and possible analysis of social relationships
convergence rate for processing fluctuations in a low-trust
between objects at the edge of the IoT by describing
environment. The authors have investigated the detailed plan-
their characteristics;
ning for convergence, flexibility, and operational integrity of
3) investigating the dynamic and static aspects of commu-
the communication network, simultaneously with the issue of
nication between objects with an interaction-based view
trust in a changing environment. In the multiagent environment
as well as a distance-based view;
of the IoT, despite the existence of multiple agents consisting
4) proposing the optimal algorithm for choosing the right
of different working groups, the characteristic of social rela-
friend in edge layers;
tions between objects and neighbor discovery, the principles
5) computing of the loss function of this algorithm to
of safety and trust assigned by the owners [3], a reliable link
search for position and estimate its parameters while
for social cooperation in service delivery. It makes it possible
obtaining optimization results for the use of network
for a new member to benefit from the entire network at any
processing resources.
time and this is also effective in improving the quality of
In this processing overhead, the limited elements and end services (QoS) and the speed of task processing and better
devices are offloaded to the central processing resource, and resource management [11]. Fortino et al. [12] introduced a
the smart friend selection strategy is used according to the CoT scenario in which physical objects in the cloud were
characteristics of introducing elements in the network to connected with software agents and virtual to use the social
eliminate the tracking of irrelevant aspects. The use of decision network method for cooperation among themselves. They
theory to optimize the selection and optimal friend selection at divided the existing tasks into various groups with character-
the edge of the network helps for decreasing human resource istics of cooperation and ambition. When configuring a group
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
SOURI et al.: TRUST-AWARE AND AUTHENTICATION-BASED COLLABORATIVE METHOD FOR RESOURCE MANAGEMENT 3
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
participating the performance of each object in its life cycle Therefore, in order for nodes to reach the cooperating objects
and each period of membership in the IoT network. Com- with high accessibility and ease, it is necessary to determine
municating some inherent characteristics of objects during a the efficient diameters in each connection that connects all the
communication affects mutual cooperation in each relation- objects of a region. To estimate the characteristics of each
ship, such as object type selection, mobility model selection, object in the S-IoT model and the type of its relationship
operating model type, device processing power, and commu- with its peers, we define a probability distribution with a
nication frequency in each interaction. Allocating, tracking, continuous random variable X which depends on the distance
and retrieving these relationships between objects in S-IoT are parameters, the type and the working group of the requested
done without human intervention and only with his permission service, two connected objects in any type of relationship
at the application level. Focusing on the cooperation of things CLOR, CWOR, SOR, POR, and OOR keeps the social contin-
with each other and with humans in S-IoT, the following uously connected [20], [21]. Considering the features related
relationships are formed autonomously, which provide services to the interaction history and target workspace, because of the
such as processing and use of other network resources in the involvement of nodes in routing and positioning in the IoT
appropriate situation [4]. network and because of the participation of more nodes in
more than one correlation of service provision, the importance
1) Parent-Object Relationship (POR): This relationship is
of keeping records is visible. By carefully examining the
established between homogeneous devices and is fixed
probability density function of a uniform distribution for a
and consistent at almost any time based on device pro-
random variable assigned to the relationship and the type of
file parameters such as product category, manufacturer,
expected service defined by X [20], any type of relationship
category, and end device class.
between objects can be specified, analyzed, and defined [22].
2) Co-Location Communication of IoT Objects Together
(C-LOR): Between homogeneous/heterogeneous devices
located at a fixed location, this communication is formed A. Friendship Relationship Between Objects Based on
solely based on the device’s position in the IoT network Probabilistic Trust
hierarchy. Bayesian deduction has been used to correctly predict the
3) Relationship of IoT Objects Based on the Type of friendship relationship between objects based on interaction
Task and Common Work They Perform (CWOR): This and evaluate the trust probability of dynamic friendship rela-
relationship is formed based on providing a common tionship. Considering fixed features such as the node builder
task between homogeneous/heterogeneous devices. This in the simulator environment, the interaction duration of
relationship is established to implement the decision neighboring objects is calculated randomly. Therefore, because
at the required time and is almost constant in every of the dynamic interaction changes with time, a dynamic
operating period of the system. friendship with a uniform distribution between objects can be
4) Relationship Based on the Object of Ownership (OOR): defined for this interaction and Bayes theorem can be used to
This concept is provided for heterogeneous devices with model it as follows:
a common owner.
PDF(Friend|I )
5) Social Object Relationship (SOR): This relationship is
PDF(I | Friend) ∗ PDF(X | Friend) ∗ PDF(Friend)
shown a collaborative method between heterogeneous =
cloud-edge devices and based on frequent previous con- PDF(I ) ∗ PDF(X )
(1)
nections between objects that belong to related owners
(such as devices belonging to classmates, friends, and where I is the amount of interaction and X is the appearance
different social groups). distance between friends in the local friendship relationship.
Device selection based on the type of communication and
requested services can be determined by all three parameters, B. Decisioning Offloading Tasks and Processes to Friend
the number of steps of the shortest route, geographical dis- and Peer Devices
tance, and social location [9]. The possible distance distri- The goal of this section is to determine end-device process-
bution of network nodes in an area is based on the number ing for existing task offloading procedures for a high-level
of steps of the shortest path of each pair of nodes and is processing partner device, which tasks can be processed on
randomly selected. Finally, the position of the nodes in each a network end device or a peer device. By measuring the
connection in the social network of objects is effective on the performance value of the system during the time and energy
number of selected nodes that have a friendship and social consumption of the process discharge in the edge device of
relationship and are looking for a particular service. In the the IoT, the issue of maximum and optimal use of processing
developed communication model, there is no restriction on resources, communication, and optimal allocation of resources
object selection to receive services such as task processing, can be raised at the edge.
and all nodes have an equal chance to start a friendship In exchange for energy consumption, the IoT network can
communication in S-IoT [19]. According to the mentioned use the resource management approach to ensure QoS at the
S-IoT model, each device on the edge of IoT can commu- edge, reduce latency, and ultimately save energy to solve this
nicate with other objects and devices based on trust-based problem. Considering the magnitude and continuity of the data
authentication and its history, location, and profile parameters. flow collected from/to the environment by end devices at the
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
SOURI et al.: TRUST-AWARE AND AUTHENTICATION-BASED COLLABORATIVE METHOD FOR RESOURCE MANAGEMENT 5
end of the IoT edge, the altruism and interactive relationship SOR is the distribution parameter of objective social relations
between them described and the selection of the processing between objects and CWOR is a shared task relation between
transfer location, which is explained in the operational model objects. Each of the functions of relation (1) is the cumulative
next, it is possible to check the different performance condi- density of relations for the better performance of objects in
tions of the processing services of the devices at the edge of establishing relations. Thus, various types of friendship rela-
the network. Sometimes it is even necessary to perform the tionships, static friendship, and dynamic friendship between
initial processing of tasks at the edge of the IoT in the device pairs of nodes have been used.
itself, which is called self-cooperation, which depends on the The network distance between the end device and the
processing task. gateway device does not change over time and device profile
In S-IoT, considering that the phenomenon of friendship data that are always constant. Dynamic Friendship is one that
can be formed as a gradual relationship in the community of changes over time, such as history of interaction of process-
objects at the edge of the network, therefore, the selection ing tasks between different levels of devices at the network
of friends between objects is done based on the principles edge. Based on this, the type of interactive communication
of homophily [23]. For example, the more similar two edge to provide processing services at the edge of the network is
devices are to each other in terms of features, the more defined based on distance and processing and data assignment.
likely they are to be friends [23] and thus be in the first In fact, each node in any type of intranetwork communication
level of cooperation in edge processing. These friendships and at the edge of the network updates its assessment of others
collaborations can be defined as C-LOR or CWOR at the IoT while communicating and based on the type of relationship or
edge level. According to the type of relationship of friendship interactive behavior between them.
and cooperation between objects and the density of uniform Therefore, according to the above explanations in the type
distribution between them, X Friend can be considered with all of relationships between network edge devices, three methods
the independent variables of the relationship defined between for processing at the edge of the IoT are suggested as follows:
objects. Therefore, with the uniformity of the probability of
1) direct connection between IoT end devices and edge
availability of XPOR and XCLOR, all objects involved in a
servers, to process tasks in edge servers according to
relationship at the edge of the IoT network and subtracting
S-IoT collaboration relationship definition;
from one by removing cooperation cases that do not have
2) local processing at IoT end devices or at local gateways
any of the defined relationships between objects, at least one
at the edge of the network (node-peer friendly relation-
variable survival relation between objects in the local region
ship);
can be calculated as follows and considered in the process
3) local execution of tasks on the edge servers with a
allocation model:
regional scale.
F(friend(x)) = 1 − (1 − FPOR(x)) ∗ (1 − FCLOR(x)) The ability to perform processing on the network edge device
∗(1 − FOOR(x)) ∗ (1 − FSOR(x)) and upload tasks to the edge for processing depends on
∗(1 − FCWOR(x)). (2) the capabilities of the network edge devices and the com-
prehensive definitions of the cooperation model such as tit-
By calculating the cumulative distribution function and proba- for-tat mechanism in S-IoT [25]. On the other hand, some-
bility density of X Friend as a uniform distribution, it is possible times excessive and unnecessary delays are caused in the
to show the most probable pairs of nodes in communicating processing of tasks by the cloud-edge data centers. Then, it
friendship and cooperation. According to (2), the X Friend is recommended to perform processing on local network edge
distribution between each pair of objects at the edge of the devices such as IoT edge gateways, which structurally and
network is similar to a power law and guarantees the type of dynamically change the communication and friendship rules
relationship between objects and devices [24]. X itself is a between nodes. Therefore, in edge processing, according to the
design variable based on the type of connection and the dis- area covered and the type of communication between different
tance and friendship probability distribution between objects. devices in terms of network distance and type of ownership
Each of the subfunctions FPOR(x), FCLOR(x), FOOR(x), and device level, a balance can be established between device
FSOR(x), and FCWOR(x) according to the uniformity of energy consumption, task processing, and delay.
the probability of availability of each pair of friendly objects 1) Proposed Trust-Based Relationship Model: The opera-
in a certain distance and the relevant variables is defined tional components of the proposed scenario, shown in Fig. 1,
as follows; consist of a local gateway connected to the edge server, which
(POR) parent relationship of objects that objects have this provides the main processing and computing resources for
property without dependence on position, have the property of the end devices at the edge. Existing IoT devices can be
making long links between objects and with uniform probabil- mobile, which have limited processing resources and energy
ity distribution. The function FPOR(x) is the density value of due to their size, application, and so on. The computing
the regular distribution for the class of objects with long links. capacity of C.Ti is defined for each device i. The input of this
The same thing is true about other relationships; As CLOR model includes Di , program code size(bits), system settings,
is also a common location relation of objects. OOR is the program codes, and the number of processor units to execute
property relationship of their objects and social relations are existing tasks (Ci ). Based on the mentioned parameters and
formed based on it. This parameter has a uniform distribution. assumptions, the computing capability of the local gateway
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
and its processing time is computed as follows. Assuming up a trust-based cooperation algorithm between objects at the
the atomicity of the processing tasks delegated from the end edge of the network (friend selection) to select the best friends
device, the amount of data sent and the total amount of from the objects at the edge of the IoT as follows. First,
processor unit can be found and applied to the current system a comprehensive search method was used to find possible
performance model. Assume that any processing task can be solutions and identify applicants who have the most selection
processed by a processing device at the edge or on an IoT end conditions to provide the desired services (processing services
device: Fil , the local computing capability of device i can be in this research) with cooperation. For this purpose, we first
calculated in terms of training/s [26] determined all the possible combinations of the probability of
cooperation (friendship) between the nodes, regardless of the
Til = Ci /Fil . (3) type and order of selection, completely mathematically and
Of course, the overhead caused by the data obtained in step with the relation C (Nr, k). In this relation, Nr is the number
3 was not considered in modeling. The transmitted data rate of of cooperating nodes, where 1 ≤ k ≤ Nr. Here, to select
each end device can be adjusted from zero to Ri (Pi ). The total the best partner nodes in each type of relationship between
remote processing time for device i is Til ( f i , Pi ) as follows: devices and between network levels, we introduced a loss
function as follows, whose variables are given as follows: set
Til ( f i , Pi ) = Tit (Pi ) + Tie ( f i ) (4) of friends in relationship (F), number of jumps (D), total
number of edge services (S), and priority of trust value (T ) in
so that the transmission time is related to the size of the
the relationship. Decreasing the output value of this function
offloaded data value Di and the data transmission rate Tit (Pi )
leads to the selection of your colleague and friend node, which
and Tie ( f i ), respectively, and is given as follows:
leads to an increase in interest and an increase in profit. The
Di relationship between the coefficients in this relationship is
Tit (Pi ) = . (5)
w.log2 (1 + ai .Pi ) considered as follows: α1 + α2 + α3 + α4 = 1 and 0 < α1,
α2, α3, α4 < 1. In this research, the number of friends and
Increase/decrease bandwidth consumption of the network
jumping have destructive effects on energy consumption and
edge communication channel in data transmission between
bandwidth, whose coefficients are positive and in the form of
the local device Id and the IoT edge processing station is
α1 and α2, to increase the losses. In addition, the number and
ai = (h i /N0 ). In this case, Tie ( f i ) will be given as follows:
type of tasks show the parameters of satisfaction. The greater
Ci and positive these factors are, the greater the overall benefit
Tie ( f i ) = . (6)
fi from the S-IoT approach will be. α3 and α4 are negative
coefficients in the loss and damage reduction function of nodes
According to the task offloading method, the required process-
cooperation in a processing optimization problem. The loss
ing energy management remains in the IoT end device and the
function of the method investigated in this research will be
lifetime of the device is increased [27].
given as follows:
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
SOURI et al.: TRUST-AWARE AND AUTHENTICATION-BASED COLLABORATIVE METHOD FOR RESOURCE MANAGEMENT 7
TABLE I
S IMULATION PARAMETERS
Fig. 2. Shortest distance of the network in the path that each member of the
network is able to navigate.
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Fig. 5. Configuration focus based on trust and friendship between the objects
located in the edge region.
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
SOURI et al.: TRUST-AWARE AND AUTHENTICATION-BASED COLLABORATIVE METHOD FOR RESOURCE MANAGEMENT 9
the cooperation and friendship of objects and a trust frame- [12] G. Fortino, F. Messina, D. Rosaci, and G. M. L. Sarné, “Using trust
work. According to the uniformity of distribution of IoT and local reputation for group formation in the cloud of things,”
Future Gener. Comput. Syst., vol. 89, pp. 804–815, Dec. 2018, doi:
devices in each local area of the edge of the network and the 10.1016/j.future.2018.07.021.
prediction of trust based on the Bayes relationship between [13] G. Fortino, L. Fotia, F. Messina, D. Rosaci, and G. M. L. Sarné,
these objects, the uniform cumulative probability density is “A meritocratic trust-based group formation in an IoT environment
for smart cities,” Future Gener. Comput. Syst., vol. 108, pp. 34–45,
indicative of the total possible friendship connections between Jul. 2020, doi: 10.1016/j.future.2020.02.035.
objects. In this research, a friend selection algorithm is pro- [14] Z. Hong, W. Chen, H. Huang, S. Guo, and Z. Zheng, “Multi-hop coop-
posed to obtain remote services such as processing, which erative computation offloading for industrial IoT-edge-cloud computing
environments,” IEEE Trans. Parallel Distrib. Syst., vol. 30, no. 12,
is based on comprehensive search for orientation and for- pp. 2759–2774, Dec. 2019, doi: 10.1109/TPDS.2019.2926979.
mulation of task processing assignment variables. Finally, [15] F. Samie, L. Bauer, and J. Henkel, “From cloud down to things: An
the target scenario was simulated in the iFog-Sim tool and overview of machine learning in Internet of Things,” IEEE Internet
analyzed with other scale-free case studies of random network Things J., vol. 6, no. 3, pp. 4921–4934, Jun. 2019, doi: 10.1109/JIOT.
2019.2893866.
mode and giant components. The simulation results show the [16] K. Alatoun, K. Matrouk, M. A. Mohammed, J. Nedoma, R. Martinek,
better performance of the S-IoT design at the edge of the and P. Zmij, “A novel low-latency and energy-efficient task scheduling
IoT network in communication navigation and handing over framework for Internet of Medical Things in an edge fog cloud system,”
Sensors, vol. 22, no. 14, p. 5327, Jul. 2022, doi: 10.3390/s22145327.
processing to the remote colleague. In the implementation of [17] L. Wei, J. Wu, C. Long, and B. Li, “On designing context-aware
simulations, the features of the network topology such as the trust model and service delegation for social Internet of Things,”
conditions of the minimum network distance of the nodes IEEE Internet Things J., vol. 8, no. 6, pp. 4775–4787, Oct. 2021, doi:
10.1109/JIOT.2020.3028380.
in the routing process between the growth of the number of [18] L. Atzori, A. Iera, G. Morabito, and M. Nitti, “The social Internet of
links and the minimum number of friends were considered. Things (SIoT)—When social networks meet the Internet of Things: Con-
In future works, this research will create new solutions for cept, architecture and network characterization,” Comput. Netw., vol. 56,
no. 16, pp. 3594–3608, Nov. 2012, doi: 10.1016/j.comnet.2012.07.010.
developing optimal solutions in service delivery management [19] C. Marche, L. Atzori, V. Pilloni, and M. Nitti, “How to exploit the
through service management. Reliability approaches, mobility, social Internet of Things: Query generation model and device profiles’
and QoS requirements in different S-IoT scenarios can be dataset,” Comput. Netw., vol. 174, Jun. 2020, Art. no. 107248, doi:
10.1016/j.comnet.2020.107248.
investigated. [20] V. Mohammadi, A. M. Rahmani, A. Darwesh, and A. Sahafi, “Trust-
based friend selection algorithm for navigability in social Internet of
Things,” Knowl.-Based Syst., vol. 232, Nov. 2021, Art. no. 107479, doi:
R EFERENCES 10.1016/j.knosys.2021.107479.
[21] L. Militano, M. Nitti, L. Atzori, and A. Iera, “Enhancing the navi-
[1] J. Wang, M. K. Lim, C. Wang, and M.-L. Tseng, “The evolution of the
gability in a social network of smart objects: A Shapley-value based
Internet of Things (IoT) over the past 20 years,” Comput. Ind. Eng.,
approach,” Comput. Netw., vol. 103, pp. 1–14, Jul. 2016, doi: 10.1016/j.
vol. 155, May 2021, Art. no. 107174, doi: 10.1016/j.cie.2021.107174.
comnet.2016.03.007.
[2] R. Magdich, H. Jemal, and M. B. Ayed, “A resilient trust manage-
[22] S. V. Akram et al., “Performance analysis of IoT and long-range
ment framework towards trust related attacks in the social Internet
radio-based sensor node and gateway architecture for solid waste
of Things,” Comput. Commun., vol. 191, pp. 92–107, Jul. 2022, doi:
management,” Sensors, vol. 21, no. 8, p. 2774, Apr. 2021, doi:
10.1016/j.comcom.2022.04.019.
10.3390/s21082774.
[3] F. Amin, A. Ahmad, and G. S. Choi, “Towards trust and friendliness [23] L. M. Verbrugge, “The structure of adult friendship choices,” Social
approaches in the social Internet of Things,” Appl. Sci., vol. 9, no. 1, Forces, vol. 56, no. 2, pp. 576–597, 1977, doi: 10.2307/2577741.
p. 166, Jan. 2019, doi: 10.3390/app9010166.
[24] C. Marche, L. Atzori, and M. Nitti, “A dataset for performance analysis
[4] M. S. Roopa, S. Pattar, R. Buyya, K. R. Venugopal, S. S. Iyengar, and of the social Internet of Things,” in Proc. IEEE 29th Annu. Int. Symp.
L. M. Patnaik, “Social Internet of Things (SIoT): Foundations, thrust Pers., Indoor Mobile Radio Commun. (PIMRC), Sep. 2018, pp. 1–5, doi:
areas, systematic review and future directions,” Comput. Commun., 10.1109/PIMRC.2018.8580830.
vol. 139, pp. 32–57, May 2019, doi: 10.1016/j.comcom.2019.03.009. [25] L. Pu, X. Chen, J. Xu, and X. Fu, “D2D fogging: An
[5] S. Iftikhar et al., “HunterPlus: AI based energy-efficient task schedul- energy-efficient and incentive-aware task offloading framework via
ing for cloud–fog computing environments,” Internet Things, vol. 21, network-assisted D2D collaboration,” IEEE J. Sel. Areas Commun.,
Apr. 2023, Art. no. 100667, doi: 10.1016/j.iot.2022.100667. vol. 34, no. 12, pp. 3887–3901, Dec. 2016, doi: 10.1109/JSAC.
[6] I. U. Din, K. A. Awan, A. Almogren, and B.-S. Kim, “ShareTrust: Cen- 2016.2624118.
tralized trust management mechanism for trustworthy resource sharing in [26] X. Chen, L. Jiao, W. Li, and X. Fu, “Efficient multi-user com-
industrial Internet of Things,” Comput. Electr. Eng., vol. 100, May 2022, putation offloading for mobile-edge cloud computing,” IEEE/ACM
Art. no. 108013, doi: 10.1016/j.compeleceng.2022.108013. Trans. Netw., vol. 24, no. 5, pp. 2795–2808, Oct. 2016, doi: 10.1109/
[7] K. C. Chung and S. W.-J. Liang, “An empirical study of social network TNET.2015.2487344.
activities via social Internet of Things (SIoT),” IEEE Access, vol. 8, [27] X. Chen, “Decentralized computation offloading game for
pp. 48652–48659, 2020, doi: 10.1109/ACCESS.2020.2978151. mobile cloud computing,” IEEE Trans. Parallel Distrib. Syst.,
[8] I.-R. Chen, F. Bao, and J. Guo, “Trust-based service management vol. 26, no. 4, pp. 974–983, Apr. 2015, doi: 10.1109/TPDS.2014.
for social Internet of Things systems,” IEEE Trans. Depend. Secure 2316834.
Comput., vol. 13, no. 6, pp. 684–696, Nov./Dec. 2016, doi: 10.1109/ [28] M. Nitti, L. Atzori, and I. P. Cvijikj, “Friendship selection in the
TDSC.2015.2420552. social Internet of Things: Challenges and possible strategies,” IEEE
[9] L. Atzori, A. Iera, and G. Morabito, “From ‘smart objects’ to ‘social Internet Things J., vol. 2, no. 3, pp. 240–247, Jun. 2015, doi: 10.1109/
objects’: The next evolutionary step of the Internet of Things,” IEEE JIOT.2014.2384734.
Commun. Mag., vol. 52, no. 1, pp. 97–105, Jan. 2014, doi: 10.1109/ [29] F. Amin, R. Abbasi, A. Rehman, and G. S. Choi, “An advanced
MCOM.2014.6710070. algorithm for higher network navigation in social Internet of Things
[10] B. Bhola et al., “Quality-enabled decentralized dynamic IoT platform using small-world networks,” Sensors, vol. 19, no. 9, p. 2007, Apr. 2019,
with scalable resources integration,” IET Commun., to be published, doi: doi: 10.3390/s19092007.
10.1049/cmu2.12514. [30] A. Lakhan et al., “Delay optimal schemes for Internet of Things
[11] G. Jiang, B. Hu, and Y. Wang, “Agent-based simulation of competitive applications in heterogeneous edge cloud computing networks,”
and collaborative mechanisms for mobile service chains,” Inf. Sci., Sensors, vol. 22, no. 16, p. 5937, Aug. 2022, doi: 10.3390/
vol. 180, no. 2, pp. 225–240, Jan. 2010, doi: 10.1016/j.ins.2009.09.014. s22165937.
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Alireza Souri (Senior Member, IEEE) is currently Asghar Mohammadian is currently a Faculty Mem-
an Associate Professor with the Department of ber with Islamic Azad University, Ilkhchi, Iran. His
Software Engineering, Haliç University, Istanbul, research interests are cloud and edge computing, the
Turkey. Also, he collaborates as a Research Fel- IoT, deep learning, and autonomous vehicle systems.
low at the School of Electrical and Electronics
Engineering, Shandong University of Technology,
Zibo, China. In the scientific community, he has
been listed among the Top 2% Scientist in World
released by Stanford University, USA. In addition,
he has coauthored more than 85 scientific articles
and conference papers in high-ranked journals. His
research interests include formal verification, cloud computing, the Internet
of Things (IoT), and data mining.
Mingliang Gao received the Ph.D. degree in com- Eyhab Al-Masri (Senior Member, IEEE) is cur-
munication and information systems from Sichuan rently an Assistant Professor with the Depart-
University, Chengdu, China, in 2013. ment of Computer Science and Systems, School
He is currently working as an Associate Professor of Engineering and Technology (SET), University
with the School of Electrical and Electronic Engi- of Washington Tacoma, Tacoma, WA, USA. His
neering, Shandong University of Technology, Zibo, research interests focus on computational resource
China. His main research interests include computer sharing, resource allocation and optimization, ser-
vision and deep learning. vice migration, the Internet of Things (IoT) security,
and edge AI for the IoT.
Authorized licensed use limited to: Istinye Universitesi. Downloaded on April 21,2023 at 01:19:21 UTC from IEEE Xplore. Restrictions apply.