Recent Advances in Internet of Things and Emerging Social Internet of Things: Vision, Challenges, and Trends

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (31 March 2022) | Viewed by 22461

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Engineering, Gachon University, 1342 Seongnamdaero, Sujeong-gu, Seongnam-si, Gyeongi-do, Republic of Korea
Interests: Internet of Things; Social Internet of Things; big data analytics; inclusive smart cities; data science
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Engineering, Gachon University, Seongnam 13120, Korea
Interests: information security; cyber security; machine learning
School of Computing, Ulster University, 2-24 York Street, Belfast BT15 1AP, UK
Interests: cyber security; applied AI; IoT security and privacy; key agreement; body area networks; blockchains
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Faculty of Computing, Engineering and Science, University of South Wales, Wales, UK
Interests: information technology; human computer interaction; Alzheimer's disease; requirements engineering; augmented and virtual reality; software engineering

Special Issue Information

Dear Colleagues,

In recent years, the Internet of Things, together with its related emerging technologies, has been driving a revolution in the way people perceive and interact with the surrounding environment. Smart homes and smart offices are effective examples that are enriched with sensing, actuating, communication, and computing capabilities. The IoT provides an umbrella under which many heterogeneous technologies and objects are interacting and co-operating. The need to enhance its performance with characteristics from other more mature technologies is rising. The full potential of the emerging IoT paradigm requires a large amount of industrial and academic research efforts directed to the design, development, and assessment of novel architectures, methodologies, and technologies. The Social Internet of Things (SIoT) refers to the convergence of the IoT and social networking paradigms for the creation of social networks in which things are nodes that establish social links as humans do. This concept has become a hot topic in academic research. The benefits derive from the potential of social networks within the IoT domain, such as simplification in the navigability of a dynamic network of billions of objects, robustness in the trustworthiness of objects, and efficiency in the dynamic discovery of services and information.

This Special Issue aims to involve both academic and industrial communities that operate in the fields of computer science, electronics, and telecommunications control systems, and to highlight the latest research results and advances on technologies for the abovementioned topics. The papers will be peer-reviewed, and the prospective authors are invited to submit original manuscripts on topics including, but not limited to, the keywords listed below.

Dr. Farhan Amin
Dr. Seong Oun Hwang
Dr. Aftab Ali
Dr. Ikram Asghar
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Internet of Things
  • cyber-physical systems
  • smart environments
  • standards and protocols for the Internet of Things
  • IoT toward COVID-19
  • trusted IoT ecosystem
  • Smart home
  • Big Data for IoT
  • Machine learning and artificial intelligence for the Internet of Things
  • Social Internet of Things
  • SIoT application in health care and hospital information system
  • Data mining and analytics in SIoT
  • SIoT and smart cities
  • Cybersecurity in SIoT
  • SIoT and autonomous driving systems
  • SIoT application in the smart home system
  • SIoT experimental platforms
  • Machine learning techniques in SIoT

Published Papers (6 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research, Review

3 pages, 560 KiB  
Editorial
Recent Advances in Internet of Things and Emerging Social Internet of Things: Vision, Challenges and Trends
by Farhan Amin, Ikram Asghar, Aftab Ali and Seong-Oun Hwang
Electronics 2022, 11(13), 2033; https://doi.org/10.3390/electronics11132033 - 29 Jun 2022
Cited by 3 | Viewed by 1738
Abstract
In recent years, the Internet of Things (IoT), together with its related emerging technologies, has been driving a revolution in the way people perceive and interact with the surrounding environment [...] Full article

Research

Jump to: Editorial, Review

28 pages, 7778 KiB  
Article
A Socio-Inspired Methodology and Model for Advanced and Opportunistic Interactions between Industrial IoT Objects
by Rim Kilani, Ahmed Zouinkhi, Eddy Bajic and Mohamed Naceur Abdelkrim
Electronics 2022, 11(8), 1281; https://doi.org/10.3390/electronics11081281 - 18 Apr 2022
Cited by 6 | Viewed by 1454
Abstract
The concept of the Internet of Things (IoT) is widely discussed. IoT is one of the emerging technologies that have caught the attention of many researchers. The increase in the number of exchanges of services between heterogeneous or homogeneous connected objects with the [...] Read more.
The concept of the Internet of Things (IoT) is widely discussed. IoT is one of the emerging technologies that have caught the attention of many researchers. The increase in the number of exchanges of services between heterogeneous or homogeneous connected objects with the integration of social networking concepts gives rise to the concept of the Social Internet of Things (SIoT). The SIoT concept contributes to the evolution of interactions between industrial objects by improving deterministic mechanisms towards intelligent interactions. The integration of the SIoT concept into the Industrial Internet of Things (IIoT) gives rise to the Social Internet of Industrial Things (SIoIT) and plays an important role in improving system performance in Industry 4.0. In this article, we propose an innovative methodology and a model of socio-inspired interaction between industrial communicating objects inspired by sociological approaches. Thanks to this model, socialized industrial communicating objects form a community of objects, autonomously and dynamically, by exchanging messages to know each other perfectly, and service requests between objects are executed adaptively according to the principles of social interaction governed by socio-inspired strategies and conditions. The model is implemented, tested and validated in a Netlogo multi-agent system simulation environment. Full article
Show Figures

Figure 1

23 pages, 6947 KiB  
Article
DepTSol: An Improved Deep-Learning- and Time-of-Flight-Based Real-Time Social Distance Monitoring Approach under Various Low-Light Conditions
by Adina Rahim, Ayesha Maqbool, Alina Mirza, Farkhanda Afzal and Ikram Asghar
Electronics 2022, 11(3), 458; https://doi.org/10.3390/electronics11030458 - 3 Feb 2022
Cited by 6 | Viewed by 2123
Abstract
Social distancing is an utmost reliable practice to minimise the spread of coronavirus disease (COVID-19). As the new variant of COVID-19 is emerging, healthcare organisations are concerned with controlling the death and infection rates. Different COVID-19 vaccines have been developed and administered worldwide. [...] Read more.
Social distancing is an utmost reliable practice to minimise the spread of coronavirus disease (COVID-19). As the new variant of COVID-19 is emerging, healthcare organisations are concerned with controlling the death and infection rates. Different COVID-19 vaccines have been developed and administered worldwide. However, presently developed vaccine quantity is not sufficient to fulfil the needs of the world’s population. The precautionary measures still rely on personal preventive strategies. The sharp rise in infections has forced governments to reimpose restrictions. Governments are forcing people to maintain at least 6 feet (ft) of safe physical distance to stay safe. With summers, low-light conditions can become challenging. Especially in the cities of underdeveloped countries, where poor ventilated and congested homes cause people to gather in open spaces such as parks, streets, and markets. Besides this, in summer, large friends and family gatherings mostly take place at night. It is necessary to take precautionary measures to avoid more drastic results in such situations. To support the law and order bodies in maintaining social distancing using Social Internet of Things (SIoT), the world is considering automated systems. To address the identification of violations of a social distancing Standard Operating procedure (SOP) in low-light environments via smart, automated cyber-physical solutions, we propose an effective social distance monitoring approach named DepTSol. We propose a low-cost and easy-to-maintain motionless monocular time-of-flight (ToF) camera and deep-learning-based object detection algorithms for real-time social distance monitoring. The proposed approach detects people in low-light environments and calculates their distance in terms of pixels. We convert the predicted pixel distance into real-world units and compare it with the specified safety threshold value. The system highlights people violating the safe distance. The proposed technique is evaluated by COCO evaluation metrics and has achieved a good speed–accuracy trade-off with 51.2 frames per second (fps) and a 99.7% mean average precision (mAP) score. Besides the provision of an effective social distance monitoring approach, we perform a comparative analysis between one-stage object detectors and evaluate their performance in low-light environments. This evaluation will pave the way for researchers to study the field further and will enlighten the efficiency of deep-learning algorithms in timely responsive real-world applications. Full article
Show Figures

Figure 1

27 pages, 803 KiB  
Article
A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges
by Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub and Ki-Il Kim
Electronics 2021, 10(15), 1811; https://doi.org/10.3390/electronics10151811 - 28 Jul 2021
Cited by 17 | Viewed by 9638
Abstract
Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the capital cost and workforce, which attracts organizations to conduct their businesses [...] Read more.
Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the capital cost and workforce, which attracts organizations to conduct their businesses and financial activities over the cloud. Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase. To address these, there has been much work done in this domain, whereas research work considering the growing constrained applications provided by the Internet of Things (IoT) and smart city networks are still lacking. In this survey, we provide a comprehensive security analysis of CC-enabled IoT and present state-of-the-art in the research area. Finally, future research work and possible areas of implementation and consideration are given to discuss open issues. Full article
Show Figures

Figure 1

24 pages, 423 KiB  
Article
Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment
by Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues and Youngho Park
Electronics 2021, 10(12), 1417; https://doi.org/10.3390/electronics10121417 - 12 Jun 2021
Cited by 19 | Viewed by 2550
Abstract
Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. However, as fog nodes are [...] Read more.
Fog computing as an extension to the cloud computing infrastructure has been invaluable in enhancing the applicability of the Internet of Things (IoT) paradigm. IoT based Fog systems magnify the range and minimize the latency of IoT applications. However, as fog nodes are considered transient and they offer authenticated services, when an IoT end device loses connectivity with a fog node, it must authenticate freshly with a secondary fog node. In this work, we present a new security mechanism to leverage the initial authentication to perform fast lightweight secondary authentication to ensure smooth failover among fog nodes. The proposed scheme is secure in the presence of a current de-facto Canetti and Krawczyk (CK)-adversary. We demonstrate the security of the proposed scheme with a detailed security analysis using formal security under the broadly recognized Real-Or-Random (ROR) model, informal security analysis as well as through formal security verification using the broadly-used Automated Validation of Internet Security Protocols and Applications (AVISPA) software tool. A testbed experiment for measuring computational time for different cryptographic primitives using the Multiprecision Integer and Rational Arithmetic Cryptographic Library (MIRACL) has been done. Finally, through comparative analysis with other related schemes, we show how the presented approach is uniquely advantageous over other schemes. Full article
Show Figures

Figure 1

Review

Jump to: Editorial, Research

18 pages, 2143 KiB  
Review
An Analytical Survey of WSNs Integration with Cloud and Fog Computing
by Qaisar Shaheen, Muhammad Shiraz, Shariq Aziz Butt, Abdullah Gani and Muazzam A. Khan
Electronics 2021, 10(21), 2625; https://doi.org/10.3390/electronics10212625 - 27 Oct 2021
Cited by 7 | Viewed by 2472
Abstract
Wireless sensor networks (WSNs) are spatially scattered networks equipped with an extensive number of nodes to check and record different ecological states such as humidity, temperature, pressure, and lightning states. WSN network provides different services to a client such as monitoring, detection, and [...] Read more.
Wireless sensor networks (WSNs) are spatially scattered networks equipped with an extensive number of nodes to check and record different ecological states such as humidity, temperature, pressure, and lightning states. WSN network provides different services to a client such as monitoring, detection, and runtime decision-making against events occurrence. However, the WSN network still has some limitations in computing power, storage resources, and battery life, which make the network is restricted for data transformation. It is due to less supportive battery power, and limited memory of nodes. The integration of WSN and cloud offers an open, adaptable, and more reconfigurable stage for different security checks and regulating requirements. In this paper, we discovered how WSN and cloud computing (CC) are integrated and help to accomplish different goals. Additionally, a comprehensive study about procedures and issues for an effective combination of WSN-CC is presented. This work also presents the work proposed by the research community for WSN-CC. Besides, we explored the integration of WSN/IoT with Fog computing (FC). Based on investigations, WSN integration with Fog computing (FC) has many benefits with respect to latency, energy consumption, data processing, and real-time data streaming. FC is not a substitute for distributed computing, so far it is utilized to improve the productivity of the sensor. Full article
Show Figures

Figure 1

Back to TopTop