ABSTRACT

Integration of computing and networking systems has recently been actively considered as an effective method of offering intelligent services to end-users and maximizing resource utilization. This convergence established the path for the Internet of Things (IoT) to arise. The IoT refers to a modern world in which billions of smart devices connect automatically and interact with each other. One of the most significant subjects in today's digital world is the Social Internet of Things (SIoT), a new exemplary class of the cyber physical social system (CPSS) that combines IoT and social networks. SIoT refers to a social network paradigm that involves both human-to-human communications and object-to-object interactions. Human beings are believed to be intellectual and sociable creatures. They developed a social network to attain shared objectives, including increasing performance, social behavior, security, and efficiency, in addition to offering the essential services they demand. This social structure, which allows people and things to form trust-based social relationships, can enhance object navigation and limit the object's capacity to a controllable social network of the whole thing, similar to standard social network services (SNS). SIoT, on the other hand, inherits features from several networking and computing contexts such as IoT and SNS, which significantly surge the volume and diversity of contextual information that must be managed for SIoT's adaptive service provisioning; this is the chapter's key issue. The major goal of this chapter is to give a detailed examination of the SIoT system to examine and evaluate current work in this field. As an outcome, we focus on SIoT architecture, relation management, trust management, a security framework for smart environments that integrates smoothly with diverse IoT applications, and privacy paradigm problems.

This chapter focuses on the smart environment for SIoT security architecture, the framework designed to function easily with a variety of IoT applications. It aids in the separation of security and practical privacy disputes and discusses how to isolate modules that offer functionality for each layer (for example, internet, interface, and IoT device).