ICC 2021 - IEEE International Conference on Communications 2021
DOI: 10.1109/icc42927.2021.9500254
|View full text |Cite
|
Sign up to set email alerts
|

Data Acquisition in Social Internet of Things based on Contract Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Specifically, an environment affected by high interference and noise will result in a reduction of the successful data transmission probability, and as a consequence the node trustworthiness degree will decrease. It can be observed that the proposed approach is similar to other existing works that exploit the concept of contract theory, mainly for data acquisition and trust management in social IoT [12], [13]. Specifically, in [12] both social and physical features of nodes in SIoT are analyzed to define the nodes' unique types, while in [13] the authors exploit the principles of network economics for trust management based on the efforts of node neighbors.…”
Section: Node Trustworthiness Degreementioning
confidence: 82%
See 1 more Smart Citation
“…Specifically, an environment affected by high interference and noise will result in a reduction of the successful data transmission probability, and as a consequence the node trustworthiness degree will decrease. It can be observed that the proposed approach is similar to other existing works that exploit the concept of contract theory, mainly for data acquisition and trust management in social IoT [12], [13]. Specifically, in [12] both social and physical features of nodes in SIoT are analyzed to define the nodes' unique types, while in [13] the authors exploit the principles of network economics for trust management based on the efforts of node neighbors.…”
Section: Node Trustworthiness Degreementioning
confidence: 82%
“…Different from [12], [13], in this paper we exploit the successful transmission probability achievable in a vehicular environment, which depends on the outage probability that is affected by the propagation environment, the transmission modes i.e., Vehicle-to-Vehicle (V2V) or Vehicle-to-Infrastructure (V2I), and the level of interference. In our network scenario, we assume vehicles communicate to each other via V2V dedicated short range communications.…”
Section: Node Trustworthiness Degreementioning
confidence: 99%
“…A novel matrix-factorizationbased trust prediction model is presented in [33] to address issues related to the sparse social interaction and low trust utilization in OSNs via integrating the social trust graph and recommendation system data to improve the predictive performance of OSN users. A crisis-assessment-oriented and topic-based influence maximization framework is proposed in [34] to address the risk of negative and untrusted information in OSNs [35]. A qualitative model of swift trust formation in global virtual teams is presented in [36] offering insights into how these teams develop trust behaviors among each other for effective virtual collaboration and international management.…”
Section: Online Advertisementmentioning
confidence: 99%