The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Graph-Theoretic Model for Analyzing the Properties of Local Network in Social Internet of Things

The Internet of Things (IoT) performs intensive and varied communications by a large number of devices will be overwhelmed shortly. These devices are expected to provide millions of known services and other new services. This may result in several implications for scalability, navigability, and trustworthiness. That is, it may become challenging for a device to reach an appropriate service provided by other devices. Recently a new paradigm known as the Social Internet of Things (SIoT) has gained momentum with many researchers working towards incorporating social networking concepts into IoT. By utilizing SIoT concepts, humans’ innate ability to discover, select, and use services in social networks can be extended to devices participating in IoT networks. In this context, the benchmark dataset for SIoT, namely the Santander city dataset is being adopted by many researchers for validating their proposals. In this paper, an attempt has been made to analyze the Santander dataset using a graph theoretic approach based on the Local Network Structure (LNS) i.e., node or vertex characteristics namely centrality measures. The novelty in this work can be ascribed to the application of the graph theoretic approach to large networks or graphs and get hindsight of certain intrinsic properties of large real-time networks. The major centrality measures considered in this work are degree centrality, eigen Katz centrality, vector centrality, closeness, page rank, and betweenness centralities. The integration of social networking concepts into IoT enhances service discovery, trust management, and scalability by enabling autonomous device relationships, improving network navigability, optimizing resource allocation, and strengthening security. It is observed that the outcome of the experiment provides clear insights into the efficacy of different social relationships on the aforesaid metrics using Local or Node Level analysis say, the Ownership Object Relationship (OOR) relationship displays significant node degree (43.68%). Moreover, the Co-Location Object Relationship (CLOR) relationship exhibits the highest betweenness centrality (85.6%), while the effectiveness of closeness centrality is demonstrated in three relationships: OOR (28.00%), Social Object Relationship (SORv1) (24.14%), and SORv2 (24.45%).

[1] Abdelghani W., Amous I., Zayani C., Sedes F., and Roman-Jimenez G., “Dynamic and Scalable Multi-Level Trust Management Model for Social Internet of Things,” The Journal of Supercomputing, vol. 78, no. 6, pp. 8137-8193, 2022. https://doi.org/10.1007/s11227-021-04205-5

[2] Abdul R., Paul A., Junaid Gul M., Hong W., and Seo H., “Exploiting Small World Problems in a SIoT Environment,” Energies, vol. 11, no. 8, pp. 1-18, 2018. https://doi.org/10.3390/en11082089

[3] Achir M., Abdelli A., Mokdad L., and Benothman J., “Service Discovery and Selection in IoT: A Survey and a Taxonomy,” Journal of Network and Computer Applications, vol. 200, pp. 103331, 2022. https://doi.org/10.1016/j.jnca.2021.103331

[4] Al Shareeda M., Khalil A., and Fahs W., “Realistic Heterogeneous Genetic-based RSU Placement Solution for V2I Networks,” The International Arab Journal of Information Technology, vol. 16, no. 3A, pp. 540-547, 2019. https://iajit.org/portal/PDF/Special%20Issue%20 2019,%20No.%203A/18600.pdf

[5] Alam S., Zardari S., Noor S., Ahmed S., and Mouratidis H., “Trust Management in Social Internet of Things (SIoT): A Survey,” IEEE Access, vol. 10, pp. 108924-108954, 2022. DOI:10.1109/ACCESS.2022.3213699

[6] Al-Bzoor M., Ayyad W., and Alta’ani O., “A Survey on Efficient Routing Strategies for the Internet of Underwater Things (IoUT),” International Journal of Electronics and Telecommunications, vol. 68, no. 4, pp. 825-830, 2022. DOI:10.24425/ijet.2022.143891

[7] Ali S., Kibria M., Jarwar M., Lee H., and Chong I., “A Model of Socially Connected Web Objects for IoT Applications,” Wireless Communications and Mobile Computing, vol. 2018, no. 1, pp. 1-20, 2018. https://doi.org/10.1155/2018/6309509

[8] Atzori L., Iera A., and Morabito G., “SIoT: Giving a Social Structure to the Internet of Things,” in IEEE Communications Letters, vol. 15, no. 11, pp. 1193-1195, 2011. DOI:10.1109/LCOMM.2011.090911.111340

[9] Atzori L., Iera A., and Morabito G., “Sociocast: A New Network Primitive for IoT,” IEEE Communications Magazine, vol. 57, no. 6, pp. 62- 67, 2019. DOI:10.1109/MCOM.2019.1800917

[10] Atzori L., Iera A., and Morabito G., “The Internet of Things: A Survey,” Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010. https://doi.org/10.1016/j.comnet.2010.05.010

[11] Atzori L., Iera A., Morabito G., and Nitti M., “The Social Internet of Things (SIoT)-When Social Networks Meet the Internet of Things: Concept, Architecture and Network Characterization,” Computer Networks, vol. 56, no.16, pp. 3594- 3608, 2012. https://doi.org/10.1016/j.comnet.2012.07.010

[12] Bok K., Kim I., Lim J., and Yoo J., “Efficient Graph-based Event Detection Scheme on Social Media,” Information Sciences, vol. 646, pp. 119415, 2023. https://doi.org/10.1016/j.ins.2023.119415

[13] Chen Y., Tao Y., Zheng Z., and Chen D., “Graph- Based Service Recommendation in Social Internet of Things,” International Journal of Distributed Sensor Networks, vol. 17, no. 4, pp. 1-13, 2021. https://doi.org/10.1177/15501477211009047

[14] Devaki M., Sathiamoorthy J., and Usha M., “IoT Based Air Quality Monitoring Using Densenet in Urban Areas,” International Journal of Data Science and Artificial Intelligence, vol. 2, no. 4, pp. 121-127, 2024. https://www.scribd.com/document/767256623/IO T-BASED-AIR-QUALITY-MONITORING- USING-DENSENET-IN-URBAN-AREAS

[15] Drozd W. and Kowalik M., “Application of the Internet of Things (IoT) Technology for Controlling Air Purification in the Apartment,” Archives of Civil Engineering, vol. 69, no. 2, pp. 41-52, 2023. https://journals.pan.pl/dlibra/publication/145251/ edition/127736/content

[16] Freeman L., “Centrality in Social Networks: Conceptual Clarification. Social Network: Critical Concepts in Sociology,” Londres: Routledge, vol. 1, no. 3, pp. 238-263, 1979. https://doi.org/10.1016/0378-8733(78)90021-7

[17] Hagberg A., Swart P., and Schult D., “Exploring Network Structure, Dynamics, and Function Using NetworkX,” in Proceedings of the 7th Python in Science Conference, Los Alamos, pp. 11-15, 2008. https://www.osti.gov/biblio/960616

[18] Hu F., Li Z., Yang C., and Jiang Y., “A Graph- based Approach to Detecting Tourist Movement Patterns Using Social Media Data,” Cartography and Geographic Information Science, vol. 46, no. 4, pp. 368-382, 2019. https://doi.org/10.1080/15230406.2018.1496036

[19] Jiang W., Wang G., Bhuiyan M., and Wu J., 676 The International Arab Journal of Information Technology, Vol. 22, No. 4, July 2025 “Understanding Graph-based Trust Evaluation in Online Social Networks: Methodologies and Challenges,” ACM Computing Surveys, vol. 49, no. 1, pp. 1-35, 2016. https://doi.org/10.1145/290615

[20] Joshua K. and Prabhu A., “Efficient Data Search and Retrieval in Cloud Assisted IoT Environment,” International Journal of Data Science and Artificial Intelligence, vol. 2, no. 1, pp. 1-6, 2024. https://kitspress.com/journals/IJDSAI/content/02/ 01/IJDSAI_V02_01_01_06_25112024.pdf

[21] Kleinberg J., “Authoritative Sources in a Hyperlinked Environment,” Journal of the ACM, vol. 46, no. 5, pp. 604-632, 1999. https://doi.org/10.1145/324133.324140

[22] Madavarapu J., Hasibul I., Appathurai A., Safdar G., Muthukumaran N., and Gnanamalar J., “Heterogeneous Energy Harvesting Techniques for Smart Home IoT Acceleration,” IEEE Access, vol. 12, pp. 73667-73675, 2024. DOI:10.1109/ACCESS.2024.3397664

[23] Madavarapu J., Nachiyappan S., Rajarajeswari S., Anusha N., Venkatachalam N., Madavarapu R., and Ahilan A., “Hot Watch: IoT based Wearable Health Monitoring System,” IEEE Sensors Journal, vol. 24, no. 20, pp. 33252-33259, 2024. DOI:10.1109/JSEN.2024.3424348

[24] Malik N., “Graph Theory with Applications to Engineering and Computer Science,” Proceedings of IEEE, vol. 63, no. 10, pp. 1533-1534, 1975. DOI:10.1109/PROC.1975.9996

[25] Marche C., Atzori L., Pilloni V., and Nitti M., “How to Exploit the Social Internet of Things: Query Generation Model and Device Profiles’ Dataset,” Computer Networks, vol. 174, pp. 107248, 2020. https://doi.org/10.1016/j.comnet.2020.107248

[26] Maris Murugan T., and Jeyam A., “IOT-Enabled Protein Structure Classification via CSA-PSO Based CD4.5 Classifier,” International Journal of Data Science and Artificial Intelligence, vol. 1, no. 2, pp. 41-51, 2023. https://www.scribd.com/document/767253749/IO T-ENABLED-PROTEIN-STRUCTURE- CLASSIFICATION-VIA-CSA-PSO-BASED- CD4-5-CLASSIFIER

[27] Mohammadi V., Rahmani A., Darwesh A., and Sahafi A., “Trust-Based Friend Selection Algorithm for Navigability in Social Internet of Things,” Knowledge-Based Systems, vol. 232, pp. 107479, 2021. https://doi.org/10.1016/j.knosys.2021.107479

[28] Nagamalla V., Kumar B., Janu N., Preetham A., Gangadharan S., Alqahtani M., and Ratna R., “Detection of Adulteration in Food Using Recurrent Neural Network with Internet of Things,” Journal of Food Quality, vol. 2022, pp. 1-11, 2022. https://doi.org/10.1155/2022/6163649

[29] Newmann M., Networks: An Introduction, Oxford University Press, 2010. https://doi.org/10.1093/acprof:oso/978019920665 0.001.0001

[30] Nitti M., Atzori L., and Cvijikj I., “Friendship Selection in the Social Internet of Things: Challenges and Possible Strategies,” IEEE Internet of Things Journal, vol. 2, no. 3, pp. 240- 247, 2015. DOI:10.1109/JIOT.2014.2384734

[31] Palagan A., Gupta S., Dhas A., Taware S., Ravi Chakravarthi R., and Ahilan A., “A Wireless Body Area Sensor Based IoT Scheme for Healthcare Applications,” Research Square, pp. 1-16, 2021. https://doi.org/10.21203/rs.3.rs-891137/v1

[32] Prasad M. and Reddy D., “Light Weight Clustered Trust Sensing Mechanism for Internet of Things Network,” International Journal of Electronics and Telecommunications, vol. 68, no. 1, pp. 5-12, 2022. https://doi.org/10.1080/03772063.2022.2130449

[33] Ravindran V., “IoT Based Malware Attack Detection using Layered Deep Learning Framework,” International Journal of Computer and Engineering Optimization, vol. 1, no. 2, pp. 43-49, 2023. https://kitspress.com/journals/IJCEO/index.php?i nfo=15&manuscriptid=67

[34] Selvaraj S., Thangarajan R., and Saravanan M., “Trust-Based and Optimized RPL Routing in Social Internet of Things Network,” in Proceedings of the Mobile Computing and Sustainable Informatics Conference, Patan, pp. 513-529, 2022. https://doi.org/10.1007/978-981- 16-1866-6_36

[35] Sharkey K., “A Control Analysis Perspective on Katz Centrality,” Scientific Reports, vol. 7, no. 1, pp. 1-8, 2017. https://doi.org/10.1038/s41598- 017-15426-1

[36] Wang T., Tan J., Ding W., Zhang Y., Yang F., Song J., and Han Z., “Intercommunity Detection Scheme for Social Internet of Things: Compressive Sensing over Graphs Approach,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4550-4557, 2018. DOI:10.1109/JIOT.2018.2837048

[37] Yan C., “Network Model with Scale‐Free, High Clustering Coefficients, and Small‐World Properties,” Journal of Applied Mathematics, vol. 2023, no. 1, pp. 1-11, 2023. https://doi.org/10.1155/2023/5533260

[38] Zachary W., “An Information Flow Model for Conflict and Fission in Small Groups,” Journal of Anthropological Research, vol. 33, no. 4, pp. 452- 473, 1977. DOI:10.1086/jar.33.4.3629752

[39] Zarzoor A., “Enhancing IoT Performance via Using Mobility Aware for Dynamic RPL Routing Protocol Technique (MA-RPL),” International Graph-Theoretic Model for Analyzing the Properties of Local Network in Social ... 677 Journal of Electronics and Telecommunications, vol. 68, no. 2, pp. 187-191, 2022. DOI:10.24425/ijet.2022.139866

[40] Zhu S., Yu T., Xu T., Chen H., et al., “Intelligent Computing: The Latest Advances, Challenges, and Future,” Intelligent Computing, vol. 2, pp. 1- 45, 2023. DOI:10.34133/icomputing.0006