1. Introduction
The Internet of Things (IoT) encompasses a global, dynamic infrastructure characterized by self-configuration and interoperable communications among physical devices or virtual entities, each with unique identification [
1]. These “things” actively engage in social processes and continually evolve within heterogeneous communities based on shared interests, needs, and the advantages of social relationships. However, the decentralized transactions among “smart objects” over the Internet, such as queries or state transformations, bring about notable concerns regarding security and privacy. Consequently, a transformative architecture is imperative to address these challenges within the IoT landscape. Integrating social aspects into the IoT framework has given rise to the concept of Social Internet of Things (SIoT) [
2,
3].
The primary objective of SIoT lies in fostering social relationships within the IoT paradigm, aiming to facilitate robust knowledge discovery, instill trust, and bolster the scalability and navigability of communications. The integration of social structures into IoT draws inspiration from Fiske’s theory [
4], which delineates four foundational social models observed within human communities: communal sharing, equality matching, authority ranking, and market pricing. These interaction principles are succinctly summarized in
Table 1.
SIoT mirrors human behavior by strategizing selective direct or indirect friendships (such as Friend of a Friend—FoAF) to enhance the quality-of-service composition. The original concept of the socialism of objects was introduced by Holmquist et al. [
5] in 2001.
Figure 1 visually portrays the evolution of SIoT from the Pre-Internet era (human-to-human intelligence) [
6]. Initially, social progress witnessed the integration of human-like traits into intelligent alien entities, progressing further by amalgamating collaborative human and object cognitive data [
7].
By harnessing the benefits of both social presence and intelligent decision making [
8], SIoT has emerged as a pervasive domain comprising billions of interconnected objects. These objects interface either human-to-thing or thing-to-thing for deductive operations, operating without direct human intervention [
9,
10]. Consequently, SIoT has evolved into a highly promising area of research [
11]. The flourishing of SIoTs via socialization in IoT devices, mirroring human behaviors, aims to achieve the following advantages:
In recent years, we have observed a proliferation of comprehensive reviews exploring diverse aspects of trust management within the SIoT paradigm, as evidenced by notable studies such as [
15,
16,
17,
18]. However, certain surveys, like Imran et al.’s [
19], concentrated solely on the reliability of data dissemination in SIoT concerning security and privacy. Moreover, other notable contributions, like the commentary on features in SIoT by authors in [
20], expounded on functional protocols and frameworks. In a similar vein, [
21] enumerated emerging research and technologies in SIoT, culminating in a proposed design pattern.
Furthermore, Atzori et al. [
22] conducted a statistical analysis examining social hierarchies, relationships, and mobility within SIoT entities, subsequently proposing a preliminary framework for ubiquitous computing in this domain. Despite the absence of a comprehensive convergence on all issues within SIoT to date, the prevailing focus in publications has been on security, privacy, and trust [
22]. Additionally, some educational resources, like [
23] and [
24], have delved into areas covering architecture and its components, social connections, trust administration, and navigational aspects.
One of the less explored facets within SIoT pertains to the application of big data techniques for database collection and management. The significance of this issue becomes evident when users rely on self-establishment for accurate content and data installation within SIoT. Saura et al. [
25] conducted a literature review focused on privacy within SIoT, examining five key areas: (i) data collection and privacy, (ii) security, (iii) threats, (iv) performance requirements, and (v) big data processing and analytics. Similarly, Amin et al. [
26] conducted a comprehensive review across six pivotal areas of SIoT, encompassing service composition, navigability, framework design and its components, relationships, and trust. They offered an extensive analysis of SIoT’s integration with big data and cloud computing technologies. However, we contend that certain emerging research contexts, such as cloud and fog computing, along with fault tolerance, remain relatively unexplored in prior works.
So far, our observation indicates a lack of comprehensive exploration into generic SIoT reference architecture and pivotal challenges. Most existing reviews have overlooked the interconnected facets of SIoT, neglecting crucial elements like platform dynamics, network navigability, scalability, clustering, cloud/fog computing, and fault tolerance. To bridge this gap, we propose a comprehensive survey encompassing these aspects of SIoT. Our paper’s key contributions can be summarized as follows:
In-depth exploration: we dissect unconventional SIoT patterns, offering fresh perspectives on its evolution and operational dynamics, which were previously underexplored.
Holistic framework: by detailing nine core aspects of SIoT, our work provides a scaffold for future research, bridging gaps in architecture, trust management, and more.
Focused analysis: our targeted evaluation of fault tolerance, cloud–fog computing, and clustering fills critical research voids, setting a new direction for SIoT studies.
Statistical insights: via comparative analysis, we unveil trends and advancements, offering a quantifiable measure of progress in SIoT research.
Strategic outlook: we identify pressing challenges and propose innovative solutions, guiding both academics and practitioners toward impactful future contributions.
The subsequent sections of this paper unfold as follows:
Section 2 delves into methodologies and outlines the criteria employed for paper selection.
Section 3 offers an exploration of various papers to unveil key aspects and a comprehensive taxonomy within SIoT.
Section 4 delves into open discussions surrounding SIoT, shedding light on pertinent topics.
Section 5 scrutinizes the challenges and potential directions, providing a thorough analysis. Finally,
Section 6 draws conclusions that encapsulate the findings and contributions put forth in this paper.
2. Methodology
While the concept of SIoT has been present in academic literature for some time, certain interconnections within its domains remain relatively limited. Addressing this void, a systematic literature review has been undertaken to comprehensively elucidate the essence, originality, challenges, and emergent themes of SIoT, encompassing both theoretical and empirical dimensions. This meticulous approach aims to aggregate knowledge regarding novel subjects (e.g., [
27,
28]). In pursuit of this objective, researchers leverage past authoritative contributions to devise a theoretical conceptualization of the research landscape, proposing theoretical assertions for future exploration. Within the purview of scientific review, hypotheses are tested, and subsequent analyses seek statistical relationships among pertinent variables or constructs within models [
29].
Our investigation unfolded as follows: Initially, we conducted an analysis of the theoretical underpinnings of concepts, selecting the most pertinent scientific literature within this domain [
30]. This process involved prioritizing research questions and defining criteria to filter results based on relevance. Subsequently, we delved into articles published between 2011 and April 2023 across prominent International Science Indexing publications, excluding irrelevant descriptions to elucidate the fundamental structure of SIoT [
31]. Our search spanned six international digital databases, namely ScienceDirect, IEEE Xplore, Springer, ACM, Wiley, and MDPI, as detailed in
Table 2 with corresponding online URL addresses.
To retrieve the most relevant articles, our search phrase combined consistent terms with correlated elements [
32]. Specifically, our search strings included “Social Internet of Things”, “Social IoT”, and “SIoT” coupled with related terms like “trust”, “relationship”, “architecture”, “service discovery”, “cloud/fog computing”, and “Fault Tolerance”. These searches employed logical AND combinations between consistent terms and logical OR between correlated elements or their synonyms.
Our paper selection process commenced with an initial assessment of titles, keywords, and abstracts to exclude studies not aligned with the research topic. Subsequently, we conducted an extensive analysis, emphasizing applications, to pinpoint articles suitable for inclusion. Lastly, our filtration process rigorously applied specific criteria to exclude irrelevant articles, considering parameters such as publication between 2011 and April 2023, relevance to SIoT or IoT, high-quality analytical approaches focused on key domains, accessibility to full-text content, use of the English language, publication in ISI indexed journals, and the presentation of a survey or systematic literature review that examined SIoT analytically and statistically.
Figure 2 illustrates the distribution of SIoT articles across various publishers from 2011 to April 2023. Notably, the absence of articles from Wiley in this dataset reflects the specific focus and selection criteria of our review, which prioritized sources with a direct emphasis on SIoT research. This exclusion does not diminish the value of potential contributions from Wiley but highlights the scope and direction of our systematic literature review.
3. Proposed Architecture Pattern for SIoTs
In striving for a more harmonious system within the realm of SIoTs, the reference model must align with a broad spectrum of requirements. In this section, we present our proposed architecture pattern designed to meet these imperative prerequisites. Building upon the discussion of key fundamental modules in SIoT from
Section 4, we introduce the fundamental elements within the proposed SIoT architecture pattern, as visually depicted in
Figure 3:
SIoT service discovery;
Social virtual entity (SVE) storage;
SVE resolution;
Relationship management (RM);
Relationship behavior (RB);
Monitoring.
In order to introduce a pattern for objects’ interaction, we obtained the motivation of human social relations. Before this time, many researchers in the field of sociology examined human social attitudes, developed relationship theories, and recognized a variety of types of human interaction with details.
3.1. Resolution of Social Virtual Entities
This component furnishes users with essential features and information required to establish a connection between the SVE and SIoT services. Within this context, the information encapsulated within the virtual social entity includes SIoT ID, service types (such as informational or activation-based), location details, and more. Operating at an abstract level, this feature embodies the digital counterpart of physical entities within the SVE. The interrelation between SVEs and services is crucial. Services act as gateways facilitating access to information associated with physical entities via resources tied to each service.
The SVE service specification orchestrates this connection between an SVE and the service, exploring the compatibility of characteristics between the social virtual service and the SVE. This endeavor often involves uncovering novel and predominantly dynamic connections between the SVE and its associated services. In this process, aspects like eligibility, location, proximity, and other contextual cues are factored in for the discovery operation. If no existing connection is found, a new one is established. Users have the option to subscribe or unsubscribe to receive continuous reports regarding suitable connections based on the characteristics of the virtual social entity or other services. Upon receiving a report, a corresponding function is invoked. Similarly, users can opt to subscribe or unsubscribe from receiving search reports from SVE services—services that exhibit SVE resources.
Furthermore, this component facilitates communication management, offering functionalities such as the insertion, deletion, and updating of communication links between the SVE and SIoT entities associated with it. The SIoT service monitoring component plays a vital role in autonomously discovering new connections, subsequently incorporating them into the virtual entity separation component. These new connections stem from existing connections, service descriptions, and information pertaining to the SVE, enriching the ecosystem of interactions within the SIoT environment.
3.2. Repository of Social Virtual Entity
SVE embodies a digital rendition of a physical entity within the control phase, functioning via mapping and discovery mechanisms utilizing predictive identifiers. The concept of digital counterparts within SIoT platforms stems from cloud/fog computing. These virtual profiles of devices serve several roles at the application layer:
Housing metadata pertaining to physical devices, offering detailed semantic descriptions that aid service discovery amidst device diversity.
Enhancing the functionalities of resource-constrained devices.
In practice, SVEs reside in remote cloud–edge storage, distinct from the physical devices, devoid of resource limitations in terms of computing, storage, or power. Although virtual representations exist at the application layer, locating an SVE at the network control stage is imperative for implementation purposes. The SVE inherits advantages akin to a virtual entity (VE). However, unlike a VE, primarily an application layer process, an SVE is essentially a simpler data structure emerging from the network control phase, containing SIoT device information. Specifically, an SVE is a “social” virtual representation, maintaining connections with devices in a friendship relationship with the represented device. This is achieved via the SVE’s friends table, housing entries for each friend’s device.
3.3. Relationship Behavior
Alan Fisk, an American anthropologist, investigated mankind relations and its cultural changes. He developed a theory based on a relational pattern in which individuals’ social behaviors are shaped on the basis of four elementary relational models [
4]. In order to apply human interaction patterns (CS, EM, AR, and MP) to objects’ social behavior, observing pervasive application topologies as well as foreseeing inter-object communication is necessary.
By implementing Fiske’s theory, doubtlessly, the individuality of shared objects will be sacrificed for services provided to users. The principles of this theory of interaction are summarized in
Table 1. For instance, some engaged interactions are in an “au pair” manner so that each object carries its own service to the community. In the first step, the object must search for the type of relationship (OOR, C-LOR, C-WOR, POR, or SOR) that it serves with other objects. Then, it will be able to interact based on the pattern of the social relation (CS, EM, AR, or MP). In order to select the most appropriate relationship types and then optimize the service discovery, a hierarchical set of relationships compatible with the requested service is proposed. This method improves the chance of optimum servicing according to specified parameters.
3.4. Failure
This component is outlined by typically making a detailed drawing of high-level system goals and fault tolerance, which is required to rule a SIoT. In order to decrease expenses, a way is to put aside dissimilar needs and parameterize the system plan [
16]. Nevertheless, even with identical users, unanticipated actions may appear, like a sudden crash in SIoT devices, connection failure, and overhead in a chain, which are very common due to the low reliability of equipment. In order to lessen these situations’ effects, this component should have a precise inspection of the environment. In addition, to confront unexpected behavior of SIoT devices, some measures such as forecasting potential failure, discovering available failure, diminishing negative impacts, and restoring should be taken. The responsibility of fault administration is categorized into three default functions: response to fault discovery by disseminating alarms to all involved components, logging the history of faults, and managing to correct undesirable behaviors. To this aim, this function inspects for fault and, whether necessary, generates a chain of actions to defy a problem either by changing or setting its state back to a previous healthy condition.
3.5. Configuration
This component is in charge of system initialization, such as assigning the introductory value and assembling and also storing the configuration of different functions and elements. Furthermore, it is accountable for tracking current configuration changes as well as predicting future extensional design in the system. As such, the main roles of this function are set configuration and retrieve configuration, which is responsible for authorizing the state and recouping the system.
3.6. Member
This component has supervisory control over membership and entity-relevant information. Generally, it is about creating a database to store entities related information and operates in close collaboration with the security of the system. By default, two roles are assumed for this component: Updating members’ status and a member recovery function.
3.7. Reporting
This component covers communication over other management components and summarizes the information. The implicit capability of this function is keeping system health under tight observation by gathering and examining its performance data. By developing this issue, the expectation of future states becomes feasible. The only defined role of this function is reporting retrieval, which produces reports of the system.
3.8. Monitoring
This component monitors and diagnosticates the condition of the SIoT system at a particular time. Like the fault component, for the prompt anticipation of the system, the realization of past, present, and future performance is necessary. Observation includes a behavioral performance that drives the system to a unique or set of states. The rationale is that, whereas some malicious applications may intrude on the system unexpectedly, this function has to put the system under constant intense scrutiny and inspect the consistency of alteration command. While spotting disorders, it disseminates the sequence of orders to modify the configuration. The observatory system up-to-date trust scores by employing the two following scenarios:
The periodic time-triggered: trust value is renovated per regular time interval, rather than seeking for an incident.
The reactive event-triggered: upon the occurrence of an event, for example, a new individual entry or the initiation or termination of a transaction, the trust value is reconstructed for that specific node.
4. Fundamental Key Modules of SIoTs
As highlighted in the preceding section, we delineated a comprehensive taxonomy detailing the foundational components within the construct of SIoT [
33]. Illustrated in
Figure 4, the pivotal elements of SIoT are systematically categorized into nine distinct realms: SIoT architecture, trust management, relationship management, navigability, friend selection, service discovery, fault tolerance, cloud–fog computing, and clustering techniques. Each category signifies the chronological progression of studies or their significance in relevant public events, as outlined in the subsequent subsections. This depiction offers a comprehensive overview of the evolution and relevance of each aspect within the SIoT landscape.
In our extensive literature review, summarized in
Table 3, we present a comparative analysis of recent works against our survey, shedding light on various dimensions of SIoT, including architecture, trust management, relationship management, navigability, friend selection, service discovery, fault tolerance, and cloud–fog computing. This table highlights the advancements and gaps within these areas across selected studies. For instance, while studies by [
26,
34] and [
35] offered significant insights into relationship management, they did not fully explore the nuances between friend selection and relationship management. Moreover, [
23] provided an in-depth look into object social ties and trust patterns within SIoT, yet their coverage of critical aspects such as fault tolerance, network navigability, service discovery, and cloud–fog computing remained limited. Our survey, in contrast, aims to bridge these gaps by offering a comprehensive examination across all these dimensions. Our analysis reveals a pressing need for more holistic approaches in SIoT research that address these underexplored areas, thereby fostering a more robust and interconnected SIoT ecosystem.
In
Table 3, the “✓” symbol indicates the presence or positive evaluation of the component within the referenced SIoT architecture, while the “✕” symbol denotes the absence or negative evaluation of the component. This notation provides a succinct overview of how each referenced work contributes to the various facets of SIoT.
4.1. Service Requirement in SIoTs
Service diagnosis empowers objects to autonomously acquire required services for their owners. This process facilitates inter-object relationships, allowing previously independent or newly added objects to collectively analyze and process data. Consequently, they can automatically identify an object that aligns with the specific request. Service composition forms an ecosystem where intelligent objects and their corresponding data engage with the most suitable friend category, aided by refined friend selection algorithms. This involves establishing social ties between entities, whether human or objects, seeking to offer services. Upon broadcasting the query among nearby entities, they analyze it using their available services or nearby objects, considering preferences and backgrounds. Subsequently, a set of relevant objects exhibiting the most compatible quality of service is directed to the requester. In the upcoming section, we delve deeply into the latest and most innovative papers in this field of study.
Nitti et al. [
38] explored the concept of establishing distributed social friendships as a means to achieve scalability. Addressing the deficiencies in social ties and enhancing service composition within SIoT, Dhelim et al. [
8] leveraged artificial intelligence derived from social computing. Farahbakhsh et al. [
16] delved into this issue by employing trust mechanisms and modules for evaluating relationships, performance, and global reputation alongside punitive measures. Their approach included identifying greedy nodes and calculating trust based on the desires of faithful nodes. In a novel social-like semantic approach within IoT, Xia et al. [
39] introduced a non-centralized inspection method using similarity and fuzzy algorithms to assess the type of connections.
In addressing resource discovery within SIoT, Fan et al. [
40] proposed an optimal searching algorithm, broadening connectivity in heterogeneous information networks to gauge cohesiveness. Stelea et al. [
41] applied SIoT definitions to construct heritage services, employing a trust-based approach to devise a model for service composition and provisioning. Their three-layered pattern segments trust into social perception, topology, and service features.
4.2. Navigability
Network navigability is a constitutional aspect for queries in SIoT, which indicates the existence of a short, direct route via almost every pair of nodes for communication [
42]. The SIoT is a network of many objects, which are generally connected in a friendly manner based on social relationships, their characteristics, and profile information. Due to the abundance of issues, the friend selection procedure evoked an extra assessment cost and fallen network productivity [
43]. Some advanced algorithms for the shortest path and navigability are explored below. Nitti et al. [
44] explained five heuristics of local link choice to establish proper social relations per node for SIoT navigability and scalability as well. But they did not consider trust management for honest friend selection. They specified a certain number of ties for each node, and any increase in their numbers resulted in a longer path among nodes.
Amin et al. [
45] arrived at network navigability by the small-world phenomena. For link selection, they employed the policy of an old mutual links removal based on trust metrics. However, not concerning trust for navigability and the static threshold for link selection are drawbacks in their strategy. Amin et al. [
34] presented a distributed service query in which the SIoT objects utilize centrality and the friends of friends’ information to find neighbors and hence guarantee the scalability. To further improve the concept of navigability in the small world, Amin et al. [
46] initiated the service query in various hops by sending a request to the closest node upon service requirement. This search procedure was repeated until the identification of the target node and the establishment of a permanent linkage between the requester and the provider.
Typically, Ramasamy et al. [
47] proposed a heuristics link choice per object. They discussed a strategy for the old mutual friend removal without taking trust metrics. To achieve navigability in SIoT, Rajendran et al. [
48] suggested recommendation-based tie picking. They took advantage of trust and modeled using the contentment rating and SOR-based grey wolf algorithm. Although the model was simulated on two real-world datasets, using only an undirected graph is the weakness of this study. Pashaei et al. [
49] embedded the learning automata for influential node selection in the SIoT and chose the next-hop neighbor by high centrality. Then, they claimed a well-navigable SIoT, and the searching process was settled in a short time.
Atzori et al. [
50] assimilated social properties into IoT and defined social relationship characteristics for navigability. Although there was inadequacy for the practical architecture of SIoT and its functionalities, they defined space possibility issues of related objects, that is, OOR by a power-law distribution, SOR in the tiny-scale by a power-law and large-scale by the exponential distribution, and CWOR by a gamma behavior. They supposed the distance in the CLOR is insignificant, and that POR is not reliant on distance. Their advantageous achievement lights a candle for future analysis and maintaining these relations, for instance, in [
42].
4.3. SIoT Architecture
While there is not yet a consistent architecture for SIoT, most publications exploited a three-layer model, including the base layer with a storing database on ontologies, linguistic engine, and transmission. The intermediate ground cares for the object-to-object, tie-to-tie, or object-to-tie transactions, and the upper layer is dedicated to human participation in applications by transaction among discrete items with SIoT server for the sketch and fellowship reformation and service query [
24].
The fundamental SIoT architecture was introduced by Atzori et al. [
22,
51] in the three-tier diagram: (1) the physical, (2) the network, and (3) the application layer. The bottom layer includes “things” aware of the dynamic SIoT infrastructure. The second domain includes digital pairs of sensing things by similar communal aptitudes. They act as an interface between attached devices and process the data from the bottom to the top service surface. The application execution is lodged in the cloud area and responds to the social agent functions such as service delivery, authorization, profiling, and friend selection based on trust rate. However, this basic solution created disadvantages as given below:
Centralized trust management on the SIoT server.
There was a lack of a centralized storage area or distributed trust evaluation unit.
Transmission traffic from the sensing machine to SIoT administration across the network layer.
Occurrence of a single point of failure by cause of consolidated trust element.
To tackle these problems, Mohammadi et al. [
42] spread trust functionality over all the layers. Nonetheless, some deficiencies, such as local collaboration, continuous interaction to form the CLoR, CWoR, and SoR ties, and reliability evaluation, remain unsolved in their semi-centralized SIoT trust approach.
4.4. Relationship Management
Various types of intelligent relationships have given rise to numerous things and humans who work at the same time or places [
52] by concerning the profiles, motions, and preferences. Below are the inferred precedence and object interpretation for different relationships [
36]:
Co-location object relationship (CLoR): forms between objects situated in close proximity or at the same physical location.
Co-work object relationship (CWoR): emerges when objects collaborate to accomplish shared tasks or objectives.
Parental–object relationship (PoR): occurs between objects originating from the same production batch or manufacturer.
Social–object relationship (SoR): develops when objects interact sporadically or regularly with each other.
Ownership (OoR): establishes connections among diverse objects possessed by a single user.
The relationship concept yields a community-based manner paradigm [
53] in which objects are empowered by common characteristics to recognize each other and, hence, easily make/terminate social links [
28]. For instance, due to the distributed essence of SIoT in [
54], objects received more responses to queries than in a traditional IoT environment. Mohammadi et al. [
42] chose the properties of social relationships so that they comply with SIoT navigability. The authors demonstrated the dependence of relationships typology with links distance probability distribution. Wu et al. [
55] drew an architecture for a definition of the cognitive internet of things (CIoT). Then, Kassis et al. [
56] presented a relationship pattern for the cognitive IoT by conceptual and intelligent web software agents. Despite a theoretical prototype by an illustration scenario, the datasets were not verified. Wu et al. [
57] studied machine learning for the choice of a social group by triple matrix construction, feature extraction, and community identification.
4.5. Trust Management
A multifaceted property in the SIoT paradigm is dedicated as an exclusive alternative while cryptography solutions are ineffective or unavailable to guarantee system reliability in case of malicious intruders’ disturbance. In an (S)IoT service-oriented environment, trust contributes as an inter-layer between all requester and supplier components to supervise the reliable service composition. In real life, and especially for cooperation, trust plays a role in relationship establishment. The wheel of trust in life is summarized in four phases [
58]:
Observation: collect the information on objects;
Weigh: assign a reputation score;
Selection: prioritize suitable objects;
Reward/Punishment: after the transaction, gather feedback.
Nitti et al. [
59] discussed the subjective and objective trust model. Subjective trust is measured by the node’s own experience or the belief of its friends. The objective trust is stored in a dispersed hash table. Designing a single object is the deficiency of their model. To advance their job, Chen et al. [
60] updated the trust score in the incident of affairs. The trust was estimated by first-hand monitoring α or indirect recommendation β to administrate trust propagation and aggregation as well as to improve its accuracy in dynamic situations. Talbi and Bouabdallah [
61] evaluated trust values by either direct or indirect preference. To assess direct trust, a global value was calculated by preferences, and for indirect trust, we obtained the trustor’s sincere recommendations from potential honest recommenders [
62]. Mohammadi et al. [
42] defined a trust evaluation framework based on the joint probability distribution of static trust and dynamic trust. Static or distance-based trust is calculated on all static owner variables and inferred on the Bayesian method in terms of distance X. The dynamic or interaction-based trust is calculated on the Bayesian inference of time-varying issues like relations and transactions.
Table 4 depicts an analogy of the latest SIoT trust paradigms.
Marche et al. [
63] strengthened and facilitated the service provision by objects’ trustworthiness. In their model, the objects’ major features, e.g., typology, associated functionalities, and the characteristics of the applications, were taken into account. The inquiry techniques were examined by a communal view of local and global navigability. Despite unsatisfying performance in average global path length or local routing, the authors achieved query success either in hops degree or time spent.
4.6. Friendship and Link Selection
Nitti et al. [
44] declared themselves early researchers on link selection and friendship concepts in the SIoT. They perceived five heuristics for friend choice with the least local hubs, which gave rise to fruitful global navigability. To remit this obstacle, the authors lowered the central routing cost and distributed the task locally to higher-degree neighbors. Additionally, they put a threshold on the number of hubs and clustering and hence gained the shortest path with frequency division similar to the power law. However, the authors declared the benefit of the game theory friends adjustment without any negative impact on navigability. Obviously, the fixed threshold on the number of friends leads to negative impacts. The authors of [
24] argued the gray wolf theory for smart node recommendation and the closeness scale for friend choice in SIoT. The method investigation by real-world datasets obtained achievements in mean space, MAE, RMSE, recall, and precision. They explored social trust via satisfaction and advocacy, which can be employed as a measure of relationships for the future.
SIoT delegated authority to the smart nodes for the creation or elimination of friendship without human intervention [
64]. In addition, they can individually store information [
65] and therefore obtain better navigation and more precise search mechanisms for service queries. This superiority has been fulfilled in the shadow of relationship management, but it will become tricky due to the node’s growth [
66]. This can be explained due to battery life and constraints in the storage area of SIoT devices, which is a scalability issue, or the destructive effect of malicious or selfish nodes, which is a navigability issue. For those reasons, ample attention to the number of each node’s friends is required. The proper friend selection algorithm concerning the number, type, and rate of friendships, is of importance for SIoT sustainability. By taking into consideration all above-mentioned complications of tie classification, the authors of [
42] well described a system model with an intelligent friend election strategy by exhaustive optimization search.
4.7. Fault Tolerance
Conventional IoT infrastructures somehow deteriorated with the data abundance and device heterogeneity because of power constraints or weak connectivity among devices [
67]. These failures cause extreme disruptions, like information loss, recovery expenses, or latency. This complication reveals the necessity for developing fault-tolerant algorithms with the least energy consumption. Despite all advancements, there is still a remarkable absence of fault tolerance methods in SIoT. With regard to heterogeneity and numerous manufacturers of IoT devices, attaining data about failure, recovery, and troubleshooting consequences requires pervasive sources of data. This information is utilized by self-organized components for identification and recovery of faults. These autonomic components develop a fault resilient system with self-repair characteristics [
68].
In [
69], fault tolerance capacity was considered the first parameter among IoT management features. Given the three layers architecture of IoT, this research presented a hybrid fault tolerance in the second layer of the IoT platform (i.e., cloud computing). The authors claimed the maximum utilization of active, reactive, and preventive policies and all fault detection criteria, and the implementation of most existing strategies in the recovery phase was carried out. The proposed FCAPS architecture is implemented in both Cloudsim and Pegasus–WMS emulators. The reliability of architecture was modeled by fuzzy logic and inference systems. In the recovery phase, the fault coverage weakness is noteworthy.
These wireless sensor nodes (WSN) are naturally susceptible to faults due to launching in an unreachable zone or restriction on expenses, leading to poor performance. The authors of [
70] proposed fault management with clustering algorithms to tackle these deficiencies. All permanent and transient errors are modeled using the Markov chains by the self-diagnostic method in the detection phase. In the recovery phase, with regard to hardware flaws a new status is appointed to nodes and next retrieved. The simulation results on the fault-tolerant framework proceeded on power usage, the live nodes, accuracy, and deteriorated false alarm value. Due to the limited energy in wireless sensor devices, the biggest drawback of this architecture is the use of the weakest error detection method, namely self-troubleshooting.
In [
71], the author provided an inquisitive architecture to sketch the characteristics of wireless loop control in the event of information depletion or hardware damage. A discrete-time Markov model includes basic elements such as sensor or actuator ties and recuperation to cope with their failures. The two performance criteria, namely the average input linger in management devices and the average time to fail, were defined. The performance criteria were investigated via hypothetical tests and Monte Carlo simulations. They depicted an underlying trade-off between mean activity in the regular operation of the control loop and recovery activity in abnormal operation due to faulty nodes. The optimal framework is strongly built upon measures, e.g., return sensors and connections to a healthy state, the likelihood of unsuccess in links, and the control loops. This theoretical model for optimization in multiple control systems was proposed as future work.
Casado-Vara et al. [
72] estimated the dispersed continuous-time fault for various devices in IoT using a combination of participatory control and state forecast mechanism. First, a state-dependent intermediate value matrix is designed to estimate defective values of the IoT. Second, the continuous-time Markov transition matrix, called the Kolmogorov differential equation, was modeled to determine the system feedback and compare it with the output values. This provided sufficient stability to automatically correct IoT errors, replace faulty devices with virtual devices, and prevent inaccurate data collection. However, data security, confidentiality, and reliability were not considered. The authors plan to solve this problem in the future with artificial intelligence, blockchain technology, and control algorithms.
4.8. Cloud and Fog Computing in IoT
In the event of failure and crash in SDN networks with distributed low traffic, the authors of [
73] introduced a multi-tiered architecture for fault handling by using fog computing. The optimized solution for rerouting and energy depletion with a small-scale network was formulated mathematically and empowered by a sub-optimal heuristic algorithm to tackle the computational complications in a large network. In terms of reliability, this study focused on fault avoidance. The performance of the two proposed algorithms was evaluated concerning average path length, link congestion, the number of fog nodes, task virtualization, the probability of failure occurrence, and reactions. They did not encompass queuing latency and power utilization in their study’s edge devices and transmission links. To reduce the mentioned expenses, the unnecessary nodes will be temporarily deactivated or set to idle mode. Additionally, they decided to advance their heuristic algorithm by including the sequence of platform task virtualization.
In [
74], the authors came up with a three-tiered hybrid cloud–fog-dependent architecture to schedule dynamic miscellaneous prompt IoT users. They placed various requirements with small communication overheads in the cloud servers and more communication requirements with fewer computational overheads in the fog virtual machines. However, this approach suffers the communication cost of data transmission from the IoT layer to fog and a crucial monetary expense for cloud recourses utilization. To overcome these drawbacks, the authors offer engaging on-demand multi-tenant virtual machines rather than pre-arranged hosts in the cloud layer.
To recognize the information interaction across humans, human-to-thing, and thing-to-thing in SIoT, the authors of [
75] suggested a cloud–edge collaborative dynamic information dissemination model (CCDIDM) in SIoT. By reflecting on individuals’ interplays and things’ information dissemination, the coupled relationship between nodes is created. Then, efficient interaction and cognition awareness of users are achieved by real-time processing as well as cloud–edge computing feedback. Abstract studies include the regulation of the parameter size to promote or inhibit the information dissemination threshold and the stability of the equilibrium point via LaSalle’s invariance and the Lyapunov method. It was found that the more the perception awareness of individuals, the less the propagation scale. In the future, the authors plan to study the secure correlation of communication factors in the IoT layer as well as the delay between edge and cloud processing impact on information transmission in the SIoT.
4.9. Clustering in IoT
Power preservation and lifespan rise are two principal concerns for deploying edge-computing-based Internet of Medical Things. In this context, several approaches developed clustering techniques to obtain energy efficiency. However, they mostly suffer energy cuts due to unreliable communication protocols and packet failure during transmission. The authors of [
76] developed a procedure to choose cluster head nodes based on their high remaining energy and proximity to the base station to overcome the disadvantages. They depicted the proposed model’s superiority by decreasing energy utilization and increasing sustainability and lifetime using a uniform distribution of cluster heads. Nevertheless, security and multi-hop data transmission to preserve the power in medical nodes have been neglected in their research. The authors promised to develop hierarchical multiple-hop clustering algorithms to achieve security in real-time communication.
To address computing service utilization concerning energy and delay minimization in constrained IoT applications, the study by the authors of [
77] explored resource allocation within hierarchical fog nodes and cloud server computing paradigms. They devised a process offloading game for user competition, establishing the presence of a pure Nash equilibrium and an upper bound for stability deficiency. To mitigate the exponentially increasing time complexity resulting from the number of users, they employed a near-perfect resource distribution strategy with polynomial achievement. The experimental analysis illustrated the achieved quality of experience, showcasing low-latency service for delay-sensitive IoT devices. The authors also suggested further exploration into online assignment techniques for dynamic task allocation and the collective designation of mass spectrum determination within cellular systems, offering promising prospects for reducing waiting periods in 5G networks.
In data clustering, there is a potent data mining technique applicable to vast data volumes in IoT sensor devices; however, there is a trade-off involving privacy risks associated with clustering methods. Bloom et al. [
78] introduced a differential key–mean privacy algorithm as an efficient solution, yet its outcomes were limited due to data distortion. In this study [
79], a novel clustering approach for data availability and privacy (PADC) was proposed. Leveraging the k-means algorithm and differential privacy, this method improved initial point selection and distance calculations to the center point by integrating cluster weight based on density. Additionally, it aimed to mitigate the impact of outlier detection via clustering. Performance evaluations exhibited enhanced clustering availability with a comparable privacy level compared to existing key–mean algorithms. Designing a fault-tolerant system applicable to SIoT environments remains a significant modern challenge. Future research directions include robust solutions for identifying link failures, fault tolerance in routing or service provision, device territory adaptations, and advancements in cloud and fog computing methods within SIoT.
4.10. Object Recommendation in SIoT
One significant challenge within SIoT revolves around enhancing recommendation algorithms to efficiently pair intelligent objects with users amidst vast text resources. An approach proposed by [
80] tackles this challenge via an SIoT method termed Object Recommendation based on Topic Learning and Joint Object-Related Text Features (ORTJ). This approach utilizes “thing–thing” connections in IoT, evaluating the compatibility of user requirements and smart objects while considering multiple service relevance attributes and their respective weights to augment recommendation quality. The ORTJ algorithm, derived via MAP assessment, meticulously analyzes software and hardware information, potential characteristic features, relationships among smart objects, and associated descriptive texts. This results in highly accurate recommendations and fine-tuning via parameter adjustments. However, limitations arise due to the model’s neglect of link information, leading to biased topic–word distribution and adversely impacting recommendations, compounded by limited user attribute richness. To address these shortcomings, the authors intend to enhance their model with user requirement profiles.
In the SIoT realm, a diverse array of smart objects shares similar responsibilities and facilitates user-friendly resource accessibility. However, effective service discovery hinges on various attributes of object centrality. In [
48], an Object Recommendation based on Friendship Selection (ORFS) was proposed to manage navigability and social relationships among intelligent objects in SIoT. ORFS emphasizes trust-based social communications. The approach employs a Grey Wolf Algorithm-based User Object Affiliation (GWA-UOA) mechanism for Smarter Object Recommendation (SOR) and Object Friendship Selection (OFS) using Maximum Ranked Neighborhood (MRN) approaches for navigability. This method ultimately utilizes social-driven relationship links validated via real-world datasets. Empirical findings demonstrate ORFS’s performance for navigating smart social objects within SIoT, showcasing metrics such as MAE, RMSE, computation time, average path length, recall, precision, and F1 score.
5. Analysis of Challenges and Directions
Heterogeneity: Within the vast realm of SIoT, a plethora of diverse objects, each with distinct standards and features, pose a substantial challenge in achieving interoperability and compatibility. Creating relationships such as PoR can guarantee uniformity, while additional interfaces or identification policies can bolster consistent functionality among objects sourced from different manufacturers [
81,
82].
Dynamicity and Mobility: The dynamic behavior inherent in both smart objects and the SIoT environment itself leads to frequent changes in network status. To address this dynamism, owners must dedicate efforts to maintain network topology stability and ensure adaptability. Moreover, objects consistently change locations and behavior, prompting the formation of relational communities in SIoT based on distinguishing features, movements, or shared social interests. Schemes based on location or interactions employ functions like probability distribution [
42], Euclidean metrics, or adjacency matrices to adapt their positions [
83].
Resource Constraints: SIoT devices, constrained by energy limitations, impact the network’s longevity, yet their mobile nature enhances computational power. Mohammadi et al. [
42] introduced a trustworthy friend selection algorithm aimed at optimizing variables to reduce energy consumption during the service discovery process in SIoT. However, effective remedies such as fault tolerance mechanisms, clustering, and distributed computing are still lacking to alleviate this predicament [
54,
84].
Security and Privacy: The limited processing power and storage capacity of SIoT devices render them susceptible to attacks. The heterogeneous, dynamic, and complex infrastructure of SIoT further exposes vulnerabilities. In response, researchers recommend employing cost-effective, self-synchronizing end-to-end encryption models [
85]. Additionally, securing communication protocols to trace components is essential. Techniques such as access control, secure data sharing, trust management, and predicting object attitudes based on community relations [
86] need to be prioritized, ensuring higher levels of privacy protection for real identities from disruptions.
Scalability and Navigability: Challenges in service discovery and friend selection impose burdens on the SIoT environment. Implementing effective local/global detection algorithms or community creation based on similarity measures can substantially reduce intra/inter-community transaction times and enhance network flexibility [
87].
Smart Object Recommendation: The underutilization of extensive textual information poses unresolved challenges. The reference data within SIoT, derived from human interactions and vast data sources, including comments generated during socialization or interactions with smart IoT objects, remain largely untapped. These data, encompassing both structured (user profiles) and unstructured (rich texts related to intelligent objects) factors, hold immense potential for enhancing the SIoT recommendation system. Furthermore, the heterogeneous nature of IoT objects, characterized by diverse traits, levels, protocols, standards, and features, poses significant limitations.