A social-aware group formation framework for information diffusion in narrowband Internet of Things

Z Ning, X Wang, X Kong, W Hou - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
applications of NB-IoT products and services have been launched in 2017, how to design a
social-aware framework for information diffusion in D2D-enabled NB-IoT is … NB-IoT systems. …

A decentralized latency-aware task allocation and group formation approach with fault tolerance for IoT applications

M Mudassar, Y Zhai, L Liao, J Shen - IEEE Access, 2020 - ieeexplore.ieee.org
… methodology, we have tried to enhance QoS for an IoT application. … group formation and
task distribution is shown in Algorithm 1. Edge node Eorg will send a request for group formation

Interest, energy and physical-aware coalition formation and resource allocation in smart IoT applications

EE Tsiropoulou, ST Paruchuri… - 2017 51st Annual …, 2017 - ieeexplore.ieee.org
… the wireless IoT devices within a group of devices. The main steps of the proposed coalition
formation methodology are as follows: 1. Initially, we consider the whole set of wireless IoT

A meritocratic trust-based group formation in an IoT environment for smart cities

G Fortino, L Fotia, F Messina, D Rosaci… - Future Generation …, 2020 - Elsevier
application in a smart city context, our approach introduces the actual possibility of constructing
groups of IoT … by the social capital of the IoT community, guaranteeing on the other hand …

Using trust and local reputation for group formation in the cloud of things

G Fortino, F Messina, D Rosaci, GML Sarné - Future Generation Computer …, 2018 - Elsevier
… Nowadays, a challenge for the “Internet of Things” (IoT) world is … for group formation we
will describe in Section 4 is designed to lead the agents community to a configuration of groups

Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications

P Porambage, A Braeken, C Schmitt, A Gurtov… - IEEE …, 2015 - ieeexplore.ieee.org
… analyzed two secure group key establishment mechanisms for multicasting in WSNs in the
context of IoT applications. The key derivations also implicitly authenticate group members, …

Secure group based routing and flawless trust formulation in MANET using unsupervised machine learning approach for IoT applications

M Ponguwala, DRS Rao - EAI Endorsed Transactions on …, 2019 - publications.eai.eu
… CONCLUSION: The MANET-IoT network is secured by group formation and trust filtering
approaches. Further, involvement of cryptography function ensures data security whereas hash …

A blockchain-based group formation strategy for optimizing the social reputation capital of an IoT scenario

G Fortino, L Fotia, F Messina, D Rosaci… - … Modelling Practice and …, 2021 - Elsevier
… Hence, the application of the PoW in an IoT context often requires the adoption of other
technologies as, for instance, the cloud computing. Also the long latency, low scalability and poor …

Using trust and “utility” for group formation in the cloud of things

G Fortino, L Fotia, F Messina, D Rosaci… - Internet and Distributed …, 2019 - Springer
… in forming groups of reliable recommenders over a CoT context for improving IoT devices …
Some interesting applications of trust systems in IoT and CC scenarios can by find in [3, 19, …

A reputation capital and blockchain-based model to support group formation processes in the Internet of Things

G Fortino, F Messina, D Rosaci… - 2019 6th International …, 2019 - ieeexplore.ieee.org
… the possible IoT application scenarios. Indeed, expansive consensus protocols, like the
Proof of Work (PoW) adopted by the Bitcoin currency [19] to validate and adding a new block is …