Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 https://doi.org/10.1186/s13673-020-00254-6 RESEARCH Open Access Social Internet of Things: vision, challenges, and trends Mozhgan Malekshahi Rad1, Amir Masoud Rahmani1* , Amir Sahafi2 and Nooruldeen Nasih Qader3,4 *Correspondence: rahmani@srbiau.ac.ir; rahmani74@yahoo.com 1 Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran Full list of author information is available at the end of the article Abstract IoT describes a new world of billions of objects that intelligently communicate and interact with each other. One of the important areas in this field is a new paradigmSocial Internet of Things (SIoT), a new concept of combining social networks with IoT. SIoT is an imitation of social networks between humans and objects. Objects like humans are considered intelligent and social. They create their social network to achieve their common goals, such as improving functionality, performance, and efficiency and satisfying their required services. Our article’s primary purpose is to present a comprehensive review article from the SIoT system to analyze and evaluate the recent works done in this area. Therefore, our study concentrated on the main components of the SIoT (Architecture, Relation Management, Trust Management, web services, and information), features, parameters, and challenges. To gather enough information for better analysis, we have reviewed the articles published between 2011 and December 2019. The strengths and weaknesses of each article are examined, and effective evaluation parameters, approaches, and the most used simulation tools in this field are discussed. For this purpose, we provide a scientific taxonomy for the final SIoT structure based on the academic contributions we have studied. Ultimately we observed that the evaluation parameters are different in each element of the SIoT ecosystem, for example for Relation Management, scalability 29% and navigability 22% are the most concentrated metrics, in Trust Management, accuracy 25%, and resiliency 25% is more important, in the web service process, time 23% and scalability 16% are the most mentioned and finally in information processing, throughput and time 25% are the most investigated factor. Also, Java-based tools like Eclipse has the most percentage in simulation tools in reviewed literature with 28%, and SWIM has 13% of usage for simulation. Keywords: Internet of Things (IoT), Social Internet of Things (SIoT), Social networks (SNs), Social objects Introduction IoT describes a different world of heterogeneous objects such as sensors, smartphones, and actuators in which everything, even objects, has an independent identity [1]. They have distinct features, such as different operating systems, platforms, communication protocols, and related standards, but all these differences are ignored © The Author(s) 2020. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativeco mmons.org/licenses/by/4.0/. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 when interacting with each other [2]. Therefore each device needs to communicate with other things around it to meet the needs of its users. In recent years SIoT is a new described expression in the literature that comes from combining SNs with IoT, which is related to the interaction between things and the Internet as a network substrate, and its functionality like information exchange, behavior, and relationship are independent of the human intervention [3]. Moreover, objects have this capability to establish a social relationship autonomously, and the communication between them can be varied from simple-to-complicate, for example, as simple as using some smartphone applications like Waze to route the shortest path or as complex as the communication infrastructure of a smart city [4]. SIoT used all interconnected things all over the world to create a social network based on common interests and motivation to provide better services to end-users [5]. The contribution of SIoT is for different objects to cooperate effectively and securely to gratify end-users’ desires to satisfy some main parameters such as reliability, safety, time, cost-effectiveness, and availability. Many survey papers have not focused on SIoT comprehensively to discuss it in all its aspects in detail, which motivated us to provide a new systematic literature review article because of: – Lack of comprehensive knowledge of the SIoT system that examines and compares it in detail from all aspects provides accurate statistics and results. – Lack of sufficient information about the structural and communication details of objects on the SIoT can be an excellent guide to exploring and finding its nature and challenges. – Lack and non-occurrence of resources are used in summarizing the results and evaluations performed, which has led to less accuracy of the results. – Lack of a clear method research and paper selection approach helps other researchers gather their references and related information. – Lack of transparency of the structural issue, especially in detail such as platforms, datasets, object relationships, human roles, components, and in the context of existing and forthcoming challenges, and lack of possible solutions to solve or anticipate them. Therefore, the main fields of our research include the following: • Present a taxonomy to conceive a better view of SIoT main elements. • Display a comprehensive study on the main principles and concepts of the SIoT to evaluate and examine its primary structure and cover the lack of sufficient information and awareness. • Illustrate all aspects of SIoT holistically include the main features, evaluation parameters, and simulation tools for each component of the SIoT. • Display of platforms and datasets used in evaluating SIoT samples of studied literature. • Provide meaningful statistical and technical information by investigating and analyzing many papers. Page 2 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 • Provide major SIoT challenges for a network of smart objects. • Propose open issues and future guidelines for solving problems. The structure of this article is as follows: “Background” section provides a brief background on Social IoT and presents recent studies. In “Research method” section outlines our research methods and questions. “The fundamental components of the Social Internet of Things” delineates the main structure of SIoT and highlights taxonomy and analytical comparison of recent literature. Consequently, in Section five “Discussion” and Section six “Conclusions” are presented. Background The population of humans on the earth is about 7.4 billion. This population volume needs to connect to the objects around them to improve their quality of life by sending or receiving various services. The number of objects is estimated at around 75 billion by 2025, much more than the human population. This rapid and dramatic growth [6] has caused problems such as scalability and feasibility. Therefore, different communication types between objects are necessary for our daily life demands regardless of their kind. The first idea of forming SIoT comes from [7], which Kleinberg introduces the small world phenomenon. SIoT mimics the structure of the human SNs structure and describes how to communicate, the friendship selection, or choose Friends of A Friend (FoAF) between different objects to help provide a range of certain and high-quality services [1]. Each object that is considered a friend of another object must have different parameters such as scalability, interoperability, and trustworthiness to form a healthy friendship based on evaluating these factors. Therefore, each object can communicate with other objects to improve the interaction between humans and objects based on a set of rules defined by their owners, such as how objects communicate, choose a friend, and provide services [8]. Each device we use soon becomes intelligent and social, and with the help of various sensors, can receive or send information. Socialized objects provide more accurate and faster responses to complicate requests than objects that work individually [9]. Hence we can conclude that the smarter things become, the more social the IoT becomes. Some articles concentrate on the human SNs structure, while others consider the SN of objects. Figure 1 presents the articles that recently reviewed the network structure between human SNs and things SNs structure. Tripathy et al. [9] highlight a history from the origin of SIoT that developed from IoT to SIoT. They point to some of the critical features of SIoT, including availability, privacy, and security. They explored future open issues consisting of analyzing service discovery in network navigability, analyzing a massive amount of data to describe human dynamics, and proposed new related models. The constraint of this paper is that it is not apparent how they extract studied articles. Abdelghani et al. [10] point out to trust management in SIoT and describe it as one of the main issues to build a reliable, and secure data exchange regarding QoS offered services. Therefore, they provide a comprehensive surveyed article in trust. Page 3 of 40 Eddy and Ousmma - 2018[29] Ma et al – 2017 [8] Yang et al – 2015 [26] Nitti et al – 2014 [25] (2020) 10:52 Humans Page 4 of 40 Social network structure Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. Things Kowshalya et al – 2017 [43] Bao and Chen – 2012 [53] Guo and Chen – 2015 [42] Atzori et al – 2011 [22] Atzori et al – 2012 [21] Chen et al – 2014 [39] Nitti et al – 2015 [93] Kim et al – 2017 [20] Bao et al – 2013 [44] Xiao et al – 2015 [38] Fig. 1 A comparison of the human social network structure and objects’ social network structure studied papers Table 1 Related survey articles in SIoT paradigm Article Main content Tripathy et al. [9] SIoT development research Abdelghani1 et al. [10] Trust Management in Social Internet of Things Roopa et al. [11] SIoT systematic review They discussed the primary factors and present a classification of trust types, models, related properties, SIoT limitations and requirements, and challenges. A safe relationship has two main elements as trustor and trustee, formed based on mutual benefits and affected by many parameters like location and time. Despite the comprehensively of this article, they do not consider open issues in SIoT. Roopa et al. [11] present a comprehensive systematic review based on SIoT and review the existing related articles to satisfy some main scopes in SIoT. These include trustworthiness and object relationship to improve link connection between friend objects in large scale networks and listed the essential perquisites of the SIoT system. Furthermore, this article’s main advantage is the complete analysis of the trustworthiness and summarized various aspects of SIoT relationships. However, the methodology and how they select studied articles are not clear, and the lack of a complete taxonomy on the main issues is apparent. Table 1 summarizes the related studied papers that systematically reviewed the SIoT regarding various aspects and survey articles that have been presented. The article’s main content and covered years are listed briefly in this Table. Research method All we try to do is display a new correct systematic literature review from the SIoT. So we try to find the latest articles published between 2011 and December 2019 in reputable ISI journals and conferences as our search engines, as shown in Table 2. Then we considered these interesting articles to classify them into relevant groups based on search terms and keywords. Finally, after a long review of articles, 55 articles were accepted in this research to categorize relevant articles to explain the main structure of SIoT. We used six Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 5 of 40 Table 2 Selected databases No Databases URL 1 IEEE Xplorer http://ieeexplorer.ieee.org 2 Science Direct http://www.sciencedirect.com 3 Springer http://links.springer.com 4 Taylor & Francis http://www.tandfonlone.com 5 John Wiley http://onlinelibrary.wiley.com 6 ACM http://dl.acm.org Table 3 List of keywords based on their groups’ classification No Groups 1 Social Keyword (“Social IoT’ OR “SIoT” OR “Social Internet of Things”) (“social objects” OR “social network”) AND (“Social IoT’ OR “SIoT” OR “Social Internet of Things”) 2 Objects (“social objects” OR “smart objects” OR “smart things” OR “smart devices” OR “intelligent objects”) AND (“social internet of things” OR “SIoT” OR “social IoT”) 3 Components (“elements” OR “parts” OR “components” OR “core”) AND (“social internet of things” OR “SIoT” OR “social IoT”) 4 Relationship (“relation management” OR “communication” OR “interaction”) AND (“social internet of things” OR “SIoT” OR “social IoT”) 5 Trust (“trust” OR “trustworthiness” OR “trust management”) AND (“social internet of things” OR “SIoT” OR “social IoT”) 6 Service (“service selection” OR “service composition” OR “service discovery” OR “web processing service” OR “service” OR “services” OR “web services”) and (“social internet of things” OR “SIoT” OR “social IoT”) 7 Data (“information” OR “metadata” OR “data”) AND (“social internet of things” OR “SIoT” OR “social IoT”) international databases, namely IEEE, Science Direct, Springer, ACM, Taylor & Francis, and John Wiley, as depicted in Table 2 with their URLs. Keywords To find relevant research articles, we use the final keywords in Table 3 to find journal and conference articles that used our groups and keywords in their concept, abstract, or title names. For finding the final search term, we use [12] method that each final search term has two constant and relative parts, the constant strings including Social IoT, SIoT, Social Internet of Things and provided relative keywords include smart objects, elements, relation management, trustworthiness, service selection, service composition, service discovery, web services, and information. We categorized them into social, objects, components, Relationship, Trust, Services, and Data distinct sets and use their synonyms phrases to provide an accurate search term. The final search phrase consists of a logical OR between all synonym relative parts with a logical AND between the two close and constant sets. Paper selection process After searching for candidate articles, we use the following criteria to refine them to select final studies or eliminate irrelevant articles as follows: Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 6 of 40 Web services Platforms Chen et al – 2014 [41] Kouicem et al – 2014 [55] Chen et al – 2015 [56] Garg et al – 2016 [57] Butt et al – 2013 [58] Wei and Jin - 2012 [59] Xia et al – 2019 [60] Klauck and Kirsche – 2012 [61] Shamszaman and Ali [62] Baker et al – 2017 [63] Pallec et al –2016 [64] Ma et al – 2015 [65] Liu et al - 2018[100] Mayer and Guinard – 2011 [101] Byun et al - 2014 [75] Pintus et al - 2012 [76] Girau et al - 2013 [77] Girau et al - 2016 [78] Beltran et al - 2014 [79] Helal et al – 2012 [80] Cicirelli et al - 2016 [81] Cicirelli et al - 2017 [82] Shen Chen et al – 2017 [83] Sanchez et al – 2013 [84] Zhang et al - 2012 [85] Pasha - 2016 [102] Architecture Tripathy et al- 2016 [9] Ortiz et al- 2014 [16] Evangelos et al - 2011 [17] Gulati and et al - 2019 [23] Gulati and et al – 2019 [24] Dutta and et al - 2015 [97] Academic Literatures Lakshmanaprabu et al -2018 [67] Hasan and Fadi - 2017 [68] Ahmad et al - 2017 [69] Alam et al – 2016 [70] A. Ahmad – 2016 [71] Relation Management Information Nitti et al – 2014 [25] Kowshalya and Valarmathi – 2017 [35] Xiao et al – 2015 [38] Chen et al -2014 [39] Chen et al – 2015 [40] Guo and Chen – 2015[42] Bao et al – 2013 [44] Sharma et al – 2018 [45] Troung et al – 2016 [46] Ling et al – 2015 [98] Bach et al – 2012 [99] Kim et al – 2017 [20] Atzori et al – 2012 [21] Atzori et al – 2011 [22] Fu et al – 2018 [28] Eddy et al – 2018 [29] Wei et al – 2018 [30] Atzori et al – 2011 [31] Trust Management Fig. 2 A taxonomy of reviewed academic literature based on SIoT main elements – – – – – – – – – – – The following selection criteria are applied to the final result: Articles published between 2011 and December 2019 Articles are related to IoT and SIoT Articles that provide high-quality approaches and ideas for SIoT have analyzed SIoT analytically and statistically, especially in a particular domain like objects relationship The following elimination criteria are applied to the final result: Articles not in the English language Articles not index in ISI Articles not access to full-text documents Articles present an overall survey and systematic review Articles do not consider SIoT analytically and statistically The scope of candidate articles is entirely irrelevant to SIoT Final selected articles Figure 2 shows the refined articles using the method discussed in the previous subsection, which we have grouped according to the main structure of SIoT. Researchers can have a complete and clear view of the final articles and make it easier to decide on reputable articles. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 7 of 40 25 20 15 10 5 0 IEEE Science Direct ACM Springer other Wiley Fig. 3 Total selected articles between 2011 and December 2019 based on their publishers Social Internet of Things Architecture Relation Management Trust Management Layered Things Unified Relational Generic Humans Parental OR Communal Sharing Owner OR Equality Matching Co-work OR Authority Ranking Co-location OR Market Pricing Trust Types Trust Models Web Services Information Tools Service Discovery Data Collection Platform Service Selection Data Storage Dataset Service Composition Data Filtering Data Processing Social OR Fig. 4 A taxonomy of the SIoT Figure 3 presents a comparison between total studied papers over time based on their publishers, as mentioned in Table 2. Related research questions This article tries to respond to the following Research Questions (RQs): – – – – RQ1: What target platforms, datasets are there for SIoT? RQ2: What evaluation parameters are essential for the core elements of SIoT? RQ3: What simulation tools are used to simulate the main structure of SIoT? RQ4: What are the most important challenges of the SIoT? The fundamental components of the Social Internet of Things In Fig. 4, we have designed a holistic taxonomy to describe SIoT, which consists of six main components: Architecture, Relation Management, Trust Management, Web Services, Information, and finally, SIoT tools that include datasets and platforms. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Fig. 5 Proposed SIoT an architecture Architecture Although there is no standard architecture for SIoT, most articles proposed a fourtier architecture that includes devices (objects), global connections, platforms, and applications based on IoT architecture [13]. Devices need to be connected to the internet or a gateway directly or indirectly to send or receive information from a particular platform or user application. Global connections are responsible for connecting objects to each other and playing a communication layer between platforms and devices using communication standards, gateways, and protocols (MQTT, HTTP, HTTPS, CoAP) to read and exchange information over the Internet between objects as a middleware. Applications are used to capture all user application services, such as smart homes, smart health, industrial, and mobile applications [14]. This architecture defines IoT basics, but it is not perfect for deploying SIoT architecture, so we have shown a five-layer architecture for SIoT in Fig. 5, which includes the entity, component abstraction, communication, social interaction, and application layer. The entity, communication, and application layer functionality are similar to IoT reference architecture, but we have specified the component abstraction and social interaction layer to the SIoT architecture. Page 8 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 9 of 40 Table 4 A comparison between the different architectures presented in SIoT Article Main Topic Strengths Weakness New Idea Tripathy et al. [9] Considering the main aspects of SIoT Considering some scope for future No simulation Two dimensionalclient and serverarchitecture Ortiz et al. [16] Considering the main aspects of SIoT Consider the challenges and open issues deeply No simulation A combined architecture of IoT and WoT Kim et al. [20] End-user programming tool for the SIoT It is easy to learn and use, for both programmers and non-programmers – The ontology model architecture Atzori and et al. [22] Integrate social structure concept in IoT Integration of human No simulation social network architecture with SIoT Relational architecture Gulati and et al. [23] The semantic perspective of SIoT Semantic-oriented platform No details about their implementation Semantic-oriented platform architecture Gulati and et al. [24] SIoT architecture Effective communication management Static Three-layer architecture for industrial IoT Voutyras et al. [96] Improves the knowledge flow – A SIoT knowledge flow architecture COSMOS project social approach – The Component abstraction layer: this layer contains the key elements of the SIoT that are essential for communication between objects that include ID1 (each object has its unique identifier with which it is identified throughout the network), OP2 (static and dynamic information of any object like their profiling information), and OC3 (all activities and interactions of objects are carried out under the control of the command and rules of their owners) to perform service discovery, trust management, relationship management, and service selection processes. – The Social Interaction Layer: this layer is used as an interface and social agent to establish social communication between smart objects and humans. A comparison between SIoT architecture given in recent contributions is presented in Table 4 in detail. Table 5 presents a summary of studied articles based on their domain and the type of architecture (layered, generic, relational and unified that layered and relational is clear but generic is general and public IoT architecture that allows allocation and change in different areas such as the smart city, agriculture, health, energy [15], SIoT and WoT [16]. Based on different IoT architecture, various IoT applications are created. Their basic architecture is the same as the IoT architecture, but it has been customized on various applications. The unified means integrating architectures based on platforms, devices, smart objects [17] to create a better architecture to solve IoT problems, for example, integrating the edge and cloud computing concept or IoT architecture of platforms with building a 1 ID Management. 2 Object Profiling. 3 Owner Control. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 10 of 40 Table 5 Related architecture types In SIoT Article Architecture Domain Description Tripathy et al. [9] Layered SIoT Two dimensional-client and server-architecture Ortiz et al. [16] Generic SIoT A generic architecture that integrates IoT and WoT for the creation of SIoT Evangelos et al. [17] Unified IoT A unified architecture that combines RFIDs and smart objects to create SN. Kim et al. [20] Relational SIoT Socialite architecture that combines smart objects Atzuri et al. [21] Layered SIoT A three-tiered architecture includes SL, NL, and AL Atzuri et al. [22] Relational SIoT An architecture based on smart objects socializing Gulati and et al. [23] Layered SIoT Four-layer semantic-oriented platform architecture for SIoT Gulati and et al. [24] Layered IIoT A three-layer architecture for industrial IoT Fu et al. [28] Layered SIoT SSIoT architecture to enhance QoS factors in the SIoT system. Voutyras et al. [96] Relational SIoT A relational architecture based on four main groups as FM, PPM, SM, and SA SIoT Two dimensional-client and server-architecture Dutta and et al. [97] Layered suitable software infrastructure based on the micro-services to develop IoT solutions and create smart products [18] or create a middleware integrated architecture for IoT security for empowering IoT applications [19]). Ortiz et al. [16] introduced the main dimensions of SIoT as Social role (the integration of human social networks with IoT for efficient service search and discovery; accordingly establish a social relationship between human and objects), intelligence (as the most important feature, helps them to decide their situation so that they can more easily start, end or change a relationship), social conscious devices (that means the intelligent objects can communicate with humans through the Internet) and everything as a service (objects are recognized by the services they provide, so anything including objects, social networks, environments, etc., is considered as a service to make it easier to discover and share with others). Accordingly, they developed a hybrid architecture of IoT and WoT, includes actors such as objects and users, an intelligent system for managing and coordinating transactions between objects including searching and discovering for services, exchanging information, an interface for activating interactions between objects, including control commands and service management and finally the Internet as a communication platform for transferring object services to users. This study’s advantage is that they consider the challenges and open issues deeply and provide a detailed description of SIoT while the deficit is that they do not introduce any suitable platform to implement their method. Kim et al. [20] proposed a new architecture for SIoT end-users based on a threelayered Socialite system: Socialite Client application, Socialite Server, and Databases. Socialite Client application has two components, first, control or access to devices remotely, and the next, allowed them to define their own rules for communication by end-user programming. Socialite server is used to access overall access to devices that may have different creators, and databases are used to process and store data. Atzori et al. [21, 22] proposed a two-tier social-based architecture for SIoT: one is for SIoT server which contains three sub-layers: The base layer, the component layer, and the application layer, which is the base layer responsible for storage, data Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 management, database and communication, and the component layer contain the core elements of the SIoT system (objects), and the application layer also contain applications, API and interfaces. The other side is the client that has three sub-layers including objects layer, object abstraction (which is defined to coordinate the relationship of objects through a common language) and the application layer also includes two parts, including service management (that are used to manage the behavior of objects in the SIoT, which is related to the human interface in the application layer of the server), and social agent that is used to communicate between objects and the SIoT server. In the base layer, two types of components are introduced, including key and lateral components. The key SIoT components include Id management that assigns and manage an id to identify each object, object profiling, which includes static and dynamic information about each object, and owner control, which includes a set of rules set by the object’s owners and other components including service discovery, service composition, trust management, and relationship management. This study’s strong point is the Integration of human social network architecture with the SIoT concept, but there is no simulation in this article. Gulati and et al. [23] introduced four-layer semantic-oriented platform architecture for SIoT as a reference model, including four-layer: objects, communication, SIoT management, and application layers. The layer of objects refers to the objects that are placed on the SIoT, and communicate through local networks and sensors, and is the lowest layer. The communication layer includes protocols, gateways, and technologies that are used to communicate between objects. The SIoT management layer is related to SIoT platforms and services that include essential components such as id management, object profiling, owner control, service discovery, service composition, trust management, and relationship management that communicate with the application layer via the API. The application layer includes various applications such as mobile applications, web applications, etc. So they have devised a complete architecture for SIoT, but they have not explored the details about their implementation. Gulati and et al. [24] proposed a three-layer architecture for industrial IoT that by using semantic technologies, they have investigated the relationship between different objects. They have seven design considerations for their SIoIT architecture: resource management, relationship control, data management, interfaces, scalability, interoperability, trustworthiness, security, and privacy. Their proposed architecture has the following layers: – The base layer consists of two sub-layers includes the infrastructure and communication layer. – The middleware layer responsible for interactions and transactions between different components in SIoIT, and it acts as an interface between the hardware and the application layer. – The application layer accesses to user applications. This article’s strength is effective communication management and the combination of the SIoT concept with the industry. The disadvantage is that it is not dynamically tested in a real industrial environment and remains as future work. Page 11 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Relation management (RM) There are many interesting papers mentioned to RM in SIoT. For example, according to [9], every object on the social network receives more accurate responses to their requests than objects that work individually. Therefore, these objects need to communicate with each other to form a social community to request or respond to relevant services, and the SIoT works based on these friendly relationships. Besides, the main purpose of creating SIoT is to separate things from humans to build their social networks autonomously. Thus, RM shows the hidden intelligence of objects that help them decide to start a friendship, update, or end it [25]. Also, each object must choose its type of relationship with other objects [26] to share relevant resources, information, and services. Therefore, the management of their relationships is based on the choice of relationships they have with other objects around them. The relationships between different things start when they find social nature. Therefore, according to recent articles [20, 21, 27], we can divide the relationship between different devices into five main groups as presents in taxonomy in Fig. 4, namely Parental OR,4 Owner OR, Co-Work OR, Social OR, and Co-Location OR. – Parental OR (POR): This relationship is established between objects with a manufacturing plant, and usually, all objects that work together are homogenous. – Owner OR (OOR): This relationship is established between objects with a specific owner like heterogeneous apps on someone’s phone. – Co-Work OR (CWOR): This relationship is established between objects that work together for a specific purpose, even in different places. – Social OR (SOR): This relationship is based on the social relationship established between the objects’ owners, which results in the collaboration between their devices. – Co-Locate OR (CLOR): This relationship is formed between objects in one place and maybe homogeneous or heterogeneous. Roopa et al. [11] delineated and classified new relationship types for SIoT based on two main categories: UO5 Relationship, which includes four main sub-categories as OOR, SOR, SIBOR6 (it belongs to objects that have the same family or group), and GSTOR7 (it refers to objects whose owners have the guest role). OO8 Relationship (it consists of six main elements: POR, CLOR, CWOR, GOR,9 STGOR,10 and SVOR11 among those objects that cooperate to satisfy a requested service). Atzuri et al. [22] provide a relational architect for the social structure of objects in SIoT to address many of IoT’s problems, like service discovery and service composition. 4 Object Relationship. 5 User-Object. 6 Sibling Object Relationship. 7 Guest Object Relationship. 8 Object-Object. 9 Guardian Object Relationship. 10 Stranger Object Relationship. 11 Service Object Relationship. Page 12 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Therefore, they have simulated objects’ mobility to evaluate the underlying relationships between objects and provide statistical analysis on SIoT to illustrate the similarity between human and object social networks. This approach’s strength is to improve network navigation capability, but there is no simulation or suggested algorithm in this study. Fu et al. [28] have presented a theoretical model– SSIoT (Search engine SIoT)–that works on four real datasets: Facebook, CDBLP, fsrWeibo P2P, to show that search engines are influential in SIoT social relationships. They first considered the search engines as an interface between social networks and IoT, and then evaluated six performance factors that included: degree distribution that strengthened power-law, and then assessed network diameter and network distance (both of them decreased dramatically), and network density, network stability, and user betweenness are increased in SSIoT model. The strength of this article is the presentation of appropriate statistical analysis about the performance metrics. This model’s limitation is that the propagation of malicious codes in the SIoT network is much more than SIoT. Eddy et al. [29] proposed a reference architecture using the SIoT concept to exchange services in industrial properties for object analysis and evaluation. For this, they have compared human communication based on the Fiske model in verses of objects communication to point out that these communications are similar to each other and mentioned to SIoT protocols and related features to form a community of social communication industrial objects. The benefit of this study is that they considering IIoT scope based on SIoT. However, the service evaluation cost was not considered. Wei et al. [30] introduce physical objects as social communication concepts to describe the relationships of the physical objects accompanied by IoT to distinct the concept of social relations for physical objects from humans or smart objects. Therefore they proposed a category based on spatial–temporal features of social relationships. This paper’s profit is that they accelerated the finding of relevant physical objects between huge amounts of them. In Atzori et al. [31], an explanation is given for the various communications required in SIoT based on the communication models in human SNs. Also, the type of necessary objects transactions were shown in a Table and an app example, but there is no clearness in the object’s interaction. Human role on the SIoT system The social network of objects is modeled on human beings’ social behaviors so that they can communicate with each other and form their social network. So how humans communicate with each other is the key to creating a social network of objects. The vast impact of IoT on human life is undeniable, which has led to a two-way relationship between humans and objects. The SIoT, as a part of IoT for the proper function and production of content, requires human beings and the laws that determine it. On the other hand, SIoT is a system that can obtain the information it needs from the environment, is an essential factor in the accuracy and speed of transactions. For every object that is placed in this system, three main features must be considered [21, 29]: Object ID Management (ID Mng), Object Profiling (OP), and Owner Control (OC) Page 13 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 • ID Mng: each object has its identifier with which they are identified throughout the SIoT system. • OP: it contains static and dynamic information from each object in the network that acts as their profiling information for other objects. • OC: is a set of rules by object owners to control the behavior of objects, such as how the objects communicate with each other, start, end, or change the state of themselves in the network. After identifying objects, each object is allowed to be present and active in the SIoT under the permissions given by its owner. The OC is responsible for providing these permissions that greatly influence the way objects behave, such as determining the maximum number of members, the conditions that objects can establish, terminate, or change their status. Therefore, humans have a key and decisive role in the formation and management of SIoT systems and ensure their efficiency and effectiveness with their determining rules as owners of objects. Hitherto, a unified model of human social communication was provided by Alan Fiske in 1992 [32], which shows four elementary relational models based on human communication in social networks to analyze and evaluate their communication behaviors. His model was presented in Fig. 4 as a taxonomy that includes Communal Sharing, Equality Matching, Authority Ranking, and Market Pricing. – Communal Sharing: it’s for people who belong to a particular community, such as family and friends, to communicate based on the shared profile or the information they need or offer. – Equality Matching: based on the similar connections between different members of a particular group, while retaining their own identity and keeping load balance in the data exchange in the involved objects (there must be a balance between requesting and providing a specific service). – Authority Ranking: humans are classified hierarchically according to different levels and with different complexity. Each human being has access to a level based on his score, which leads to their asymmetric categorization, so anyone with a lower rank should be a service provider to someone with a higher score. – Market Pricing: communication between people is based on common benefits and social privileges such as wages, prices, and values. Table 6 summarized the articles studied on the SIoT that provide RM. The article’s primary content, the strength, weakness, and new finding of this article was listed for each topic. Table 7 lists the main evaluation parameters related to RM based on the studied literature. Trust management (TM) Many articles are discussed TM in SIoT. For instance, trust is one of the most critical topics in today’s technology, such as IoT [33] and cloud computing, which deals with how objects interact together [34, 35]. Lack of trust in objects that work together socially Page 14 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 15 of 40 Table 6 Comparison of articles related to RM Article Main Topic Strengths Weakness New idea Kim et al. [20] Empowering endusers for SIoT High adaptability High efficiency – A programming tool Atzori et al. [21] SIoT inter-object relationship Considering different probability distribution of distance for each relation type No accuracy in OOR approximation An analysis model Atzori et al. [22] Social structure in IoT Improving network navigability Improving network connectivity Not any implementation or algorithm An architecture based on objects relationship Fu et al. [28] Social relationship in SSIoTa Higher network stability Better performance metrics Faster malicious code propagation SSIoT model Eddy et al. [29] Social relationship in IIoTb Considering social interactions for IIoT Not evaluating service cost Architecture Wei et al. [30] Social relationship in physical objects Enhance the speed of the search process Improving availability Not any development Classification of social model for the physirelationships cal objects’ social relationship Implement the major components of the SIoT High scalability Need more detail in the proposed architecture Atzori et al. [31] Social relationships between things a Search Engine SIoT b Industrial IoT Architecture Table 7 Important evaluation parameters in RM Article Time Stability Adaptability Connectivity Efficiency Scalability Navigability Kim et al. [20] – – √ – √ – – Atzori et al. [21] – – – – – √ √ Atzori et al. [22] √ – √ – – √ √ Fu et al. [28] – √ – √ – – – Eddy et al. [29] – – – – – – – Wei et al. [30] √ – – – – √ √ Atzori et al. [31] – – – – – √ – leads to some problems such as loss of privacy, safety, security, access, and alteration of the information by unauthorized persons or things. Besides, object owners may carry out harmful attacks based on their interaction with other objects, such as Bad-mouthing, Self-promoting, and On–Off attacks; hence evaluating trust between them is essential for SIoT to identify the best interaction between customers and providers. Anything that needs to establish a trustable connection needs to have sufficient confidence in the other things that want to be connected. It can make a higher trustworthiness communication to provide some requests and separated malicious things in the network from trustable things [25]. Confidentiality is one of TM’s main issues, which means that information is available at the right time by the right person because each object has its vulnerabilities Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 and attacks. Therefore, a control system is required to prevent unauthorized access to data and network resources. Hence, it is vital to introduce a security policy in the access control system to limited access to the network from attacks [36]. Also, things adjacent to each other contain much crucial information that they can share with other things in a distributed social manner to provide some qualified services, which should be based on the right choice of things as friends because each object can discover relevant services by inquiring from its friends or FoAF to decrease searching area. After all, it is vital that every object only exchange data and services with those things that are trustable and provide a healthy and reliable communication to respond to requested demands, which leads to increased security and safety of SIoT networks. Trust types The most of related articles such as [10, 11, 25, 35–37] mentioned trusting main types as: – Transitivity: trust between different things is based on indirect known, so that for example, if (A) has confidence in (B) and (B) has confidence in (C), so (A) must trusts to (C). – Direct: it is based on direct perception between two things. – Indirect: it is based on other objects, recommendation, and reputation. – Local: it is different for any object. For instance, (A) trusts to (B), but (C) does not have any trust to (B). – Asymmetric: there are different levels of trustworthiness between two friend objects, for example, (A) has a high trust to (B), but (B) is not as same as the (A). – Subjective: it is based on individual opinions like [11, 25]. – Objective: it is based on each object’s quality of service properties like [11, 25]. – Context-dependent: it is not equal for the same devices and related to objects context like [11, 38]. – Composite: it is a composite of friend opinions and recommendations which leads to trust or distrust. – Personalized/History: it is based on the prior background of things to each other; for this reason, may two separate things have different trust levels to each other. – Dynamic: it means that the trust value is not static throughout time and may be different over time, whether the conditions altered like [11, 39–41]. Abdelghani et al. [10] presented two types of trust between objects, including quality of service trust (whether a device can be prepared high-quality service in response to a requested service or not and used many different metrics like reliability and cooperativeness to evaluate QoS trust) and social trust (which is more customary in social IoT and is a level of trust between the owners of different objects with together that is evaluated by some factors like honesty and connectivity [42]). Kowshalya and Valarmathi [35] explained a dynamic trust model to consider the degree of resiliency of trust in SIoT against On–Off selective forwarding attacks and, for the first time, categorized trust except Direct and Indirect into centrality (which is the degree of importance of an object for another one to protect SIoT network from malicious objects to prevent from making a large number of communication between objects Page 16 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 to achieve their harmful aims), energy (is vital for trust evaluation specifically in On–Off attack) and service score [43] (means that each object gets a rate for providing each service request otherwise get a penalty score. Hence the more fines are, the probability of being sabotaged is higher). Trust models In the sense that there are several models for building trust in SIoT and all models need to be evaluated for correctness and accuracy, so evaluation and model concept is intertwined. There are several models for building trust in SIoT, all of which must be assessed to use trust evaluation models instead of trust models. Many articles mentioned to these evaluation models such as: Nitti et al. [25] described a dynamic trust model based on the level of honesty between different objects. Two models for the trust were supported, including subjective and objective. The subjective model has a slower transitory response than an objective model; besides, objective processing and trust information storage are done in a DHT (Data Hash Table) system observable by all network objects. The strong point of this study is that they can separate distrust objects from network effects. Also, technical analysis for TM is done between related objects that cooperate, such that each object can be malicious if it is strange in the network. Other objects meet it rarely, and it did not become active in social activities. On the contrary, other objects can befriend. However, this article’s weakness is that they do not use direct observation to evaluate trust metrics and just assess indirect trust observations. Xiao et al. [38] propose a SIoT guarantor and reputation trust evaluation model based on objects’ behavior to propose a proper service response and used some effective techniques like credit rating and reputation rating to evaluate the degree of trust between objects. Any object that provides a complete service gets a higher rank than those who do not collaborate or do not prepare any appropriate service; finally, the objects with lower rank known as malicious objects. This work is defined as a suitable approach to determine dishonest objects, but they do not consider all main trust aspects in large scale networks like scalability. Chen et al. [39] present three kinds of social trust factors based on owner’s interaction, including Friendship, Social Contact, and Community of Interest relationship, which is based on common interests, and the system resiliency against opportunistic service attacks were considered. The limitation of this work is that they do not consider attacks approaches. Chen et al. [40] proposed an adaptive TM protocol which is based on main TM features to assess trust response: Honesty (according to direct or indirect evidence, whether or not whether an object is trustable), Cooperativeness (is related to the degree of social cooperation in a community with friends like social contact) and Community of Interest (is based on the common interests and desires or some similar capabilities that have existed between the objects that are placed in a common group or community (e.g., colocation or co-work [44])), but the deficiency of this study is that they do not consider dynamic environment issues. Sharma et al. [45] suggest a cooperative trust relaying and privacy-preserving model that, to the best of our knowledge, is the first attempt that used Fission Computing Page 17 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 18 of 40 Table 8 A comparison between trust articles with details Article Main Topic Strengths Weakness New Idea Nitti et al. [25] Trustworthiness management in the social IoT High reliability High adaptability High efficiency Not any evaluation on direct trust type Dynamic trust model Kowshalya and Valarmathi [35] Trust Management Improve performance High reliability Not considering low Dynamic trust mantrust value nodes agement model Xiao et al. [38] Present a guarantor and reputationbased trust model Suitable to detect misbehaved objects Not consider all main trust aspects in large scale networks Guarantor and reputation-based trust model Chen et al. [39] Trust manageHigh scalability ment and service High performance composition for SOA-based IoT and its application Limited to opportunistic service attacks – Chen et al. [40] Trust-based service management for SIoT Not considering dynamic environment problems Trust Management protocol Guo and Chen [42] Classification of Trust Comprehensive Computation categorized Trust Computation structure Not considering any trust metrics Trust computation models classification Bao et al. [44] Trust management Dynamic IoT envifor the community ronment of interest High adaptability and scalability – Platform Sharma et al. [45] Edge-crowdsourcing Maximum availin SIoT ability Low complexity Minimum integration cost – Cooperative trust relaying and privacy-preserving model Troung et al. [46] Trust service platform for SIoT Improving trust evaluation High adaptability - Not any simulation Trust service platform tool and implement an approach Ling et al. [98] Access service recommendation High rating accuracy - Not any simulation High network tools Stability Evaluation parameters Bachi et al. [99] Categorization of trust/distrust relationship Using generic frequent subgraphs complex relations Algorithm High adaptability High accuracy High efficiency - No comparison between other frameworks and the proposed one (which leads to the load balancing in the network) and edge-crowdsourcing network to evaluate privacy and trust. They have used several theoretical analyses and numeric simulations to implement their proposed model and numerical simulations to implement their proposed model and have also helped evaluate the proposed method’s effectiveness from real data. Truong et al. [46] delineated a general description for trust in all SIoT components according to trust information used to evaluate the amount of trust in SIoT. Moreover, they have developed a platform to assess trust services in SIoT, which has three main parts as Reputation (which is based on user’s opinion and is a system to evaluate trust authority according to user’s opinion feedback like QoS, time, and reliability), Recommendation (is based on the recommendation of users to trust or distrust to an Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 19 of 40 Table 9 Comparison of the essential criteria of trust assessment in the studied articles Article Time Cost Accuracy Adaptability Resiliency Reliability Scalability Nitti et al. [25] √ – – √ √ √ – Chiregi and Navimipour [34] – – – – – – √ Kowshalya and Valarmathi [35] – – – – √ √ – Chen et al. [40] – – √ – √ – – Bao et al. [44] – – √ √ √ – – Sharma et al. [45] – √ – – – – – Troung et al. [46] – – – √ – – – Ling et al. [98] – – √ – – – – Bachi et al. [99] – – √ – – – – object) and Knowledge (is based on default knowledge of each object). Also, they use a car-sharing service use case to implement and consider their approach. In Table 8, a summary of the related studied papers that considered SIoT concerning TM parameter has been presented. In Table 9, based on the studied articles, a brief explanation of TM’s main evaluation parameters was listed to conceive them better. SIoT trust attacks Many security attacks affect the SIoT system, which is listed below. However, many attacks face unauthorized access and suspicious behavior [47] due to a lack of authentication infrastructure [48]. The others try to present a proper perspective of themselves to gain other objects and users’ trust. So first, we need an appropriate mechanism to verify the authenticity and confidentiality of information in unauthorized access to the data and network resources [36]. To this end, we can use effective techniques to predict the behavior of objects such as machine learning, decision tree [49], and deep learning approaches. They separate malicious objects from reliable ones by predicting their next behavior to make better decisions about exchanging data. The importance of one object to another can be assessed to prevent suspicious communication between them [35]. It is also possible to design a trust management system or consider an effective encryption mechanism for encrypting data in data transmissions and sharing so that information can be exchanged securely [50]. Also, centralized privacy-preserving communities of objects can be created to form a trustable data-sharing model [51]. Also, like [25], we can use subjective trust approaches. Each node calculates its friends’ level of trust based on its history or objective methods that use distributed DHT structures to securely use information from its friends. • Bad-mouthing: misleading the background of the trustable objects to decrease its selection chance by cloud services [10, 40, 42, 44, 52, 53]. • Slandering attack: misleads trust feedback to change its results in service providers [54]. • Self-promoting: promotes itself position by offering good feedbacks about itself to alter trust services for service providers [40, 42, 44, 52–54]. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 20 of 40 YES Start Service Request Service Discovery Service Repository Service Selection Service Find = ? No Service Filtering Terminate Service Composition Fig. 6 Web services process from request to response • Whitewashing: a malicious object clean its bad background by separation from the application and, after that, join it again to increase its chance for selecting by service providers [10, 40]. • On–Off Selective: an object goes to the Off state during the primary transaction to consume a higher amount of energy until it comes back to On state [35, 42, 52]. • Opportunistic service: a malfunctioning object provides good services to enhance its popularity to collaborate in some attacks like bad-mouthing [10, 42]. • Discriminatory: attacks to those objects without strong community interaction with other objects [10, 40]. • Ballot stuffing: provides good recommendations about misbehaved objects to increase the selection chance of them to choose by service providers [10, 40, 42, 44]. Web Services As web services are one of the main challenges for developing many recent technologies like IoT, SIoT, cloud, and fog computing, we concentrated on the primary process from the beginning that a particular service is requested until an object responds to it. Therefore, a web services process scheme was illustrated in Fig. 6, a combination of three main sub-processes, in order as Service Discovery, Service Selection, and Service Composition. Service discovery is the process of searching for objects that can provide the desired service. Service selection is a selection process of appropriate service matched to requested services. Service composition is the process for combining different services to offer an appropriate response to requested services, which results in the desired quality of service, better functionalities, and feasibility because a service cannot meet all user’s needs. So, choosing suitable services and a combination of them can be one of the main concerns in the SIoT environment. Kouicem et al. [55] propose a dynamic framework based on multi-agent structure implemented on cloud computing and used large-scale composition techniques according to real use cases—in smart cities monitoring scope- to enhance performance, QoS, and contextual metrics of service selection and composition approach. Multi-agent architecture is responsible for the services’ core operations, divided into plan composition, service selection, and service orchestration to describe effective services and abstract services. They also implement three algorithms: an algorithm for plan generation, an algorithm for the best selection, and an algorithm for updating QoS metrics after selection execution. Finally, they evaluate plan generation time, service response Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 time, and success rate of services in comparison to three similar approaches (FCoSC, HTN-DL, and CDSC) and demonstrated the scalability, flexibility, and adaptability of their approach. However, they do not consider any contextual models, and there is not any exact statistics for their QoS evaluation metrics. Using a three-dimensional structure and RESTful, Chen et al. [56] provide a distributed social structure for service discovery and selection based on object interconnections. Greg et al. [57] present an integrated framework for semantic web service discovery, selection, and run-time integration for non-functional evaluation factors, like response time and throughput, to satisfy user’s requirements. They used a HIS-Healthcare Information System-use case to present the usability of their method. Their experiments are based on using a greedy search technique to combine the service response process at an optimal execution time. They provided a comparison between their method and QoSbased and hybrid approaches (it is a combination of genetic and greedy search techniques). They demonstrated that this approach is better in scalability and performance and is optimum in execution time rather than a hybrid approach. Butt et al. [58] proposed an adaptive, context-aware, and scalable protocol for service discovery in IoT. They use Trendy techniques to improve service discovery’s main factors like reducing service invocation delay, the amount of energy consumption during the network life cycle and packet overhead, and improved network scalability by reducing the number of packets. Trendy employs an efficient discovery technique with a context-aware selection in IoT web services. Wei and Jin [59] proposed a context-aware architecture and a capable ontology-based context model to provide an efficient service discovery support for IoT. The main goal is to describe the role of context in IoT and remove unreliable context because it has an essential role in making a smart discovery process regarding minimum human intervention. This study’s main point is that they present a reliable and efficient discovery process, although there are no analytical statistics to prove efficiency. Xia et al. [60] point out to SLSA—an efficient and scalable service discovery for SIoT concerning three main performance metrics including the success rate of queries, an average number of relay nodes, and average path length of searches to provide an efficient service search for secure and fast web services discovery. They compared their proposed mechanism with three others (KGC, RDPM, and HON) and classified 500 web services into 50 groups that each of them has 10 types of a specific service. Finally, they conclude that SLSA has high search efficiency in queries’ success rate, much more energy efficiency in the average number of relay nodes, and decreased average path length of the discovery process than the other compared mechanisms. This study’s strong point is that their evaluation is based on a dynamic behavior in a large scale network, and based on their results, SLSA can address resource limitations in SIoT. Klauck and Kirsche [61] presented a DNS-SD approach for discovery web services for resource constraint devices in IoT. Their approach is based on integrating three protocols (Contiki,12 mDNS13 DNS-SD14) called uBonjour to improve interoperability 12 An opensource OS. 13 Multicast DNS standard for finding other devices to share their information. 14 A discovery process to share some service attributes like location. Page 21 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 between resource constraints and non-constraint devices to discover desired services. This approach’s benefit is to promote the self-configuration and service discovery process, though they did not mention any possible flaws. Also, their implementation testbed is small. Shamszaman and Ali [62] present an effective solution for sharing resources and choosing the right object at the right time to deliver a service, taking into account QoS criteria in SIoT. It has used the Integer Programming Solutions to implement it, and the strong point of this article is that their work has high flexibility in resource sharing. However, they do not consider the entire system in terms of QoS and keep it as future work. Baker et al. [63] proposed E2C2—an energy efficiency SC algorithm for IoT-based services regarding integrating the minimum number of web services to manage the amount of energy consumption for IoT devices to satisfy user’s requirements. Their implementation is based on the performance comparison of E2C2 with existing approaches like Base Cloud, All Cloud, Smart Cloud, and COM2. The critical point of this research is the high performance and energy-awareness of the E2C2 approach, but they do not consider SS in this article to complete their SC method. Pallec et al. [64] proposed a service composition approach according to the available recommend-based IoT services to satisfy the user’s requirements. They used TAG (Typed Attribute Graph) framework to classify the recommendation of available services to facilitate the smart objects’ communications. The important part of this study is that they used a physical-interface-based algorithm to calculate the service signature for enabling service interactions. However, they do not implement any simulation for their approach. Ma et al. [65] presented a new hybrid approach that combines Genetic Programming (GP-based) with a greedy search approach on built test suit benchmarks like WSC-2008 and WSC-2009 on web services to enhance some QoS main factors like availability, reliability, and. They compare their hybrid approach with GP-based without greedy search techniques to improve the search process in a large service repository to provide a more correct and accurate composition approach. Besides, they test their approach for QoSaware service composition in dynamic and static behaviors. This article highlights that using a greedy search decreases the number of web services for the GP-based composition approach to reduce search time and increase search efficiency. The weakness of this study is that they offered no implementation to develop their approach. In Table 10, a summary of the related studied papers that considered SIoT regarding the web services process has been presented. In Table 11, based on the studied articles, a brief explanation of the main evaluation metrics was listed to analyze them. Figure 6 presents the web services process from the first. The user first requests a service. The discovery process begins to find the best services that meet the user’s demand in the service repository. However, extracting an appropriate service from the service repository needs to select a specific service based on its functional attributes. Service selection needs to check whether this service description matched with the end-users requests or not. If this service is found, then selection started, and if multiple matched services were discovered, then based on the network and user context information, the most appropriate service was selected [58]. Otherwise, it creates the appropriate service Page 22 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 23 of 40 Table 10 A comparison between the articles studied on the web service in detail Article Main Topic Strengths Weakness New Idea Chen et al. [41] SOA-based IoT service composition High survivability Minimize convergence time Just consider a few attacks Adaptive trust-based approach Kouicem et al. [55] Dynamic service selection for service composition Decreasing response Not any exact pertime centage for QoS Improving the sucmetrics cess rate Optimization technique Chen et al. [56] A social network model for service composition in IoT Improve service management Efficient service search approach High availability Model Garg et al. [57] QoS-aware approach Increasing user Not any functional for semantic websatisfaction properties conservice Improving response sidered time and throughput An integrated framework Butt et al. [58] Adaptive and context-aware service discovery – Context-aware Service Discovery Protocol Wei and Jin [59] A context-awareness High adaptability aspect of service to a dynamic discovery environment Providing an efficient service discovery process – A context-aware service discovery architecture Xia et al. [60] Efficient Social-Like Semantic-Aware Service Discovery Mechanism High scalability Considering adaptability Improving search efficiency Not considering SLSAa The mechanism for security and priLarge-Scale IoT vacy and keep it as a future research title Klauck and Kirsche [61] DNS-Based service discovery Improving interoperability Low memory consumption Not any large scale Service discovery network considstandard ered and keep it as a future issue Shamszaman and Ali [62] Object Selection High flexibility in resource sharing Not consider the entire system in terms of QoS Platform Baker et al. [63] Multi-cloud IoT service composition High energyefficient service composition Low execution time High cost An energy-efficiency algorithm Pallec et al. [64] Physical-InterfaceBased IoT Service High availability Low scalability An IoT service comNot any simulation position approach or implementation Ma et al. [65] QoS-aware and GPbased web service composition Low time More efficiency Not considering any simulation of development GP-based greedy algorithm Liu et al. [100] Service Composition High performance recommendation High accuracy Strong adaptability Not any exact service composition classification in the nonfunctional aspect Model Algorithm Mayer and Guinard [101] Semantic discovery service in webenabled IoT Not considering the heterogeneity of devices DiscoWoT interface implementation a Social-like semantic-aware Minimize service invocation delay High scalability Improving energy efficiency Semantic Discovery High flexibility High cost Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 24 of 40 Table 11 A comparison between the important parameters of evaluating web services Article Time Adaptability Reliability Flexibility Availability Scalability Interoperability Security Chen et al. √ [41] √ √ √ – √ – – √ – √ √ √ √ √ √ – – Chen et al. – [56] √ – √ – √ – – √ Garg et al. [57] – √ – – – – √ – – Butt et al. [58] – √ – – – – √ – – Wei and Jin [59] – – – √ – – √ – – Xia et al. [60] – – √ – – – √ – – Klauck and Kirsche [61] – – – – – – √ √ – Shamszaman and Ali [62] – – – – √ – – – – Baker et al. [63] – – – – – √ √ – – Pallec et al. [64] √ √ – – – √ – – – Ma et al. [65] √ √ – – – – – – – Asghari et al. [88] √ √ – – – √ – – – Liu et al. [100] √ √ √ √ √ – – – – Mayer and – Guinard [101] √ – – √ – – – – Kouicem et al. [55] Cost with the composition process and at the end, try service filtering to remove impertinent services to provide an absolute service regarding QoS factors and context-aware properties like location or context of services like its functionality descriptions that most of the user requests are concentrated on it [57]. Information The data exchange in SIoT is according to the three main characters of Big Data notion, namely Volume, Velocity, and Variety (3Vs), which have the potential to manage effectively, collect, maintain, and process to be able to analyze this massive data for evaluating and predicting objects behaviors, information [16]. Another issue in this domain is related to the massive volume of data, which was integrated into the interaction between different devices and things, so we need a specific solution to aggregate and collect data and need particular software to process this huge amount of data [66]. For example, we can present SIoT Big Data as a four-tiered framework includes: Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 – A collector server: to collect the sensed data from a common community of objects in our environment. – A storage server: to store different types of data that are aggregated from various devices. – A filtering server is a primary processing unit to remove noisy data from raw data then send it to the process server to accomplish in SIoT interactions. – A process server: to analyzed and processed stored data. Lakshmanaprabu et al. [67] implemented a Java-based SIoT data classification with an optimal feature extraction framework that presented a comparative analysis between the proposed framework with other algorithms like PSO, ACO, and GA in some performance metrics like accuracy, count of features, throughput, energy consumption and time based on four different datasets including Indoor User Movement Prediction from RSS, Water Treatment Plant, Hepatitis and Twitter Dataset for Arabic Sentiment Analysis. Therefore, they use MapReduce and Hadoop framework to improve the efficiency of the proposed framework. They filtered data by Gabor filter to reduce irrelevant data and remove unwanted noises. It is derived that by this approach, the improved accuracy is 98.2%, specificity (85.88%), and sensitivity (80%). The strong part of this research is that they provide technical analysis compared to other existing algorithms, and the drawback is that they do not consider evaluation cost. Hasan and Fadi [68] proposed a fault-tolerant routing topology for exchange data in the SIoT network by using the PMSO15 algorithm and compare it with FPMSO16 and CPSO17 methods to consider the connectivity between humans and devices, furthermore; by using PMSO, they can create, maintain and select k-disjoint paths that can tolerate possible failures in data transformation paths and implement a high-performance routing protocol. This research’s important point is that they analyze a model for each mentioned parameter like energy consumption, average delay, and throughput evaluated by fitness function with the different k-disjoint multipath routing protocol. Ahmad et al. [69] proposed a four-layered Java-based architecture based on ABC (Artificial Bee Colony) for Big Data to extract attributes, MapReduce Hadoop, to analyze a large amount of data, and Kalman filter to remove undesired noise from data processing. They compare ABC with PSO, ACO, and GA algorithms to demonstrate its high accuracy and efficiency in feature selection for Big Data notion. Therefore, they used some test datasets to evaluate the performance metrics like throughput and their algorithm’s processing time. The weakness of this study is that there is not any statistical analysis of main performance metrics. Alam et al. [70] presented a comparative analysis of eight well-known algorithms18 on data mining scope to consider each algorithm based on accuracy, processing time, and execution time. Finally, compare them based on the results together. According to this, they find out that C4.5 and C5.0 have better accuracy and processing time rather than other algorithms. Also, they have better average accuracy (97.5% and 96.61%), 15 Bio-inspired Particle Multi-Swarm Optimization. 16 Fully Particle Multi-Swarm Optimization. 17 Canonical Particle Swarm Optimization. 18 C4.5, C5.0, LDA, ANN, DLANN, NB, SVM, and KNN. Page 25 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 26 of 40 Table 12 A comparison between the articles studied on the information in detail Article Main Topic Strengths Weakness New Idea Lakshmanaprabu et al. [67] Effective features to classify SIoT Big Data Maximum accuracy Improving energy consumption High throughput Not considering evaluation cost A hierarchical framework for feature selection in SIoT big data Hasan and Fadi [68] SWARM-based data delivery in SIoT Low energy consumption Low network delay – Fault-tolerant routing protocol Ahmad et al. [69] Feature selection in big data in SIoT High efficiency There is not any Low processing time statistical analysis High accuracy Alam et al. [70] Analysis of eight Improving the well-known data accuracy mining algorithms Considering main data mining algorithms Ahmad [71] Social Element of Big Improving efficiency No cost Data High throughput Analytics in SIoT Architecture Not evaluated large Comparative analysis datasets and keep it as a future work A system architecture for data processing Table 13 A comparison between the essential parameters of evaluating information Article Time Throughput Energy Efficiency Accuracy Lakshmanaprabu et al. [67] √ √ √ √ √ Hasan and Fadi [68] √ √ √ – – Ahmad et al. [69] – √ – √ √ Alam et al. [70] √ – – – √ A. Ahmad [71] √ √ – √ – respectively. The weak point of this study is that they do not evaluate large datasets and keep it as a future experiment. Ahmad [71] proposed a parallel processing architecture for analyzing and processing huge amounts of data in SIoT systems by simulating big datasets like Vehicular Mobility Traces. To do so, they evaluated performance by using the Apache Hadoop framework. Their approach is divided into three functional scopes as an object, SIoT server, and application domain. The main advantage is that they demonstrate a direct proportional between data size and throughput, either between data size and processing time (any increment in data size leads to a decrease in processing time). In Table 12, a summary of the related studied papers that considered SIoT regarding information has been presented. The article main content, the strength, weakness, and new finding of these articles was listed for each topic. In Table 13, based on the studied articles, a brief explanation of the primary evaluation was detailed to analyze them. SIoT tools Platform IoT platforms are those software’s that can connect anything in an IoT system to each other through cloud services [72] to create new applications [11]. Hijazi et al. [72] were categorized IoT platform components in four subcategories as Sensing Component, Communication and Identification Component, Computation and Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 27 of 40 Table 14 Platforms Platform Interface Protocols Tools Database Functionality O-Sa URL Thinger.io RESTful API MQTTb CoAPc HTTP – mongoDB Cloud infrastructure for connecting things √ https://thing er.io Kaa RESTful API MQTT CoAP HTTP Apache Cassandra, Zeppelin MongoDB Cassandra oracle Collect and analyzed data Establish communication between IoT devices √ https://www. kaaproject .org DeviceHive RESTful MQTT - MQTT Apache Spark PostgreSQL SAP DB The connec√ tion between multiple IoT devices https://www. devicehive .com SiteWhere RESTful MQTT AMQP Apache Spark MongoDB, HBase Data integration, data processing √ https://sitew here.io ThingsBoard. io RESTful API MQTT HTTP Apache Cassandra Spark, Apache Kafka Device man√ agement Data collection https://thing sboard.io WSO2 RESTful API HTTP MQTT WSO2 Data Server Oracle, PostgreSQL Allow users to √ monitor their devices https://wso2. com/iot DSA RESTful HTTP – ETSDB – √ www.iot-dsa. org Lilliput [75] RESTful API HTTP Sorcerer’s book env. – The social relationship and using a social graph model – – Paraimpu [76] RESTful API HTTP Tornado, MongoDB MongoDB Add, compose, – share and adapt data www.parai mpu.com – – – https://thing speak.com Cloud-based platform [77] RESTful MQTT HTTP – Lysis [78] PaaS model HTTP MQTT implemented – on Google App Engine Semantic search – http://www. lysis-iot. com. Unknown [79] RESTful API HTTP Ontology database – Dynamically add and delete semantic RESTful services – – – – – – PerSim 3D [80] RESTful HTTP – iSapiens [81, 82] – – Edge and – out-of-edge computing Design and implement distributed cyber-physical systems – – MQTT HTTP Hadoop, spark Post notification messages to users – – Unknown [83] – – Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 28 of 40 Table 14 (continued) Platform Interface Protocols Tools Database Functionality O-Sa URL SmartSantander [84] RESTful APIs Services HTTP – – Monitor the condition variables in smart Santander city – http://www. smartsanta nder.eu Thingspeak [102] RESTful MQTT HTTP LAN MATLAB MySQL Analyze and √ visualize data https:// thingspeak. com a OpenSource b Message Queue Telemetry Transport c Constrained Application Protocol Cloud Component, and Service and Application Component. There are many platforms specifically for Big Data in IoT, such as Apache Hadoop, 1010 data, Cloudera, SAP, HPHAVEn [73], besides AirVantage and IBM Watson used for Big Data management [74]. Table 14 presents some main SIoT platforms in detail, including many scopes such as related interfaces, data manipulation protocols, tools, databases, the platforms functionality, and the URL that can use some of them like ThingSpeak, Paraimpu, Lysis, and the others for social purposes. Moreover, many other platforms such as IFTTT,19 Belkin,20 Quit,21 NaturalFuse,22 Cityscripts,23 and PhpBB Social Network24 (that is an open-source platform and a simulation of the Facebook website) that are not listed in this Table. Byun et al. [75] proposed Lilliput—an ontology-based SN platform for IoT—to illustrate an ontological and socialize perspective for interaction in IoT concept between humans, devices, and the places by using a social graph model. Also, they proposed an environment model to show the communication of smart devices and people with together that divide into three main groups as object-to-objects, humans-to-humans, and places-to-places interactions that can have many bidirectional relationships among this main classification, for example, they can have an object-to-place communication or place-to-humans or objects-to-human and vice versa. The advantage of this study is that they consider all aspects of the relationship between people and smart objects and implement efficient hybrid architecture for both IoT and SNs. The limitation of this study is that maybe increased the cost of utilizing machine learning methods. Pintus et al. [76] develop a scalable and user-friendly platform -Paraimpu- for a large scale of the SWoT paradigm to add, share, compose and interact with the HTTP smart virtual objects with together that provides data adoption in the heterogeneity nature of devices. The restriction of this study is that they do not consider the social relationships between devices. Girau et al. [77] discussed the first SIoT platform based on Thing speak to manage social interactions in a centrality manner. However, they do not consider any PaaS 19 https://ifttt.com. 20 http://www.belkin.com/us/wemo. 21 http://www.quitproject.net. 22 http://www.naturalfuse.org. 23 http://cityscripts.crs4.it. 24 Phpbbsocialnetwork.com. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 (Platform as a Service) model for this issue, so that [78] illustrates a cloud-based platform called Lysis that uses a semantic search approach and has four main elements as SVOs (Social Virtual Objects) that act as social agents to help for making a social interaction in a community autonomously to improve SD and scalability, a PaaS service model to use SVOs in the cloud to facilitate the management and development of the application by programmers and non-programmers effectively, Cloud-Storage that use a user cloud space to store devices generated data and information, Reusability to make this possible to create object templates to use in a common community. Beltran et al. [79] introduce a semantic web service platform among humans, devices, and web services by using SNs as an SCE (Social Network as a Creation Environment) where the area surrounding that users can make their desired web services privately on the devices to enhance the cooperation between semantic web services and SIoT. The excellent point is that they combine Web with IoT effectively, but there is some limitation to describe more details in their implementations. Helal et al. [80] introduced a new tool called Persim 3D to generate a real dataset from the usual activities in a smart environment like smart homes. Cicirelli et al. [81, 82] proposed a new smart city agent-based platform based on SIoT attributes called iSapiens that is a Java-based platform for designing a smart environment and using edge-computing, out-of-the-edge computing, and IoT to build a pervasive intelligent environment to form a cyber-physical paradigm for implement smart city applications. This platform has two main elements as Virtual Objects (VOs) to manage the heterogeneity of objects in IoT and software service agents to online and offline analytics by edge computing and out-of-the-edge services on computational objects. This study’s benefit is improving the fault-tolerant and main QoS factors and using them from a real case study (Smart Street Cosenza in Italy) to exploit the architecture. The deficit is that there is not an implementation or algorithm in this study. Chen et al. [83] presented new hybrid architecture to implement a platform for the SIoT paradigm based on the heterogeneity of IoT devices and the concept of SNs by using related protocols like MQTT, CoAP to analyze the collected information from these devices besides the SNs that built on Hadoop and Spark cloud servers. Sanchez et al. [84] presented a three-layered architecture for a real use case-Santander city in Spain-includes objects, gateways, and IoT servers to monitor environmental variables like pollution, weather conditions, etc. IoT objects are some resource limitation devices that sense the environments. Gateways build a connection among IoT objects and the network infrastructure. Finally, the server acts as a data repository to aggregate objects sensed data. The strong part of this study is using a large dynamic scale IoT testbed to evaluate smart environments. However, because of the ultra-large-scale of this scenario, maybe some maintenance and scalability problems occurred. Zhang et al. [85] presented a platform for social WoT to interact between humans and objects by SNs. Table 15, illustrates a summary of some studied articles about platforms that cover the main article topic, platform name, and the scope of using platforms is presented for each article briefly. Page 29 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 30 of 40 Table 15 Some studied articles on platforms Article Main Topic Platform Scope Byun et al. [75] Implement an ontology-based platform Lilliput IoT Pintus et al. [76] Paraimpu platform Paraimpu SWoT Girau et al. [77] Implementation of a SIoT platform The SIoT platform from Thingspeak SIoT Girau et al. [78] Cloud-based platform Lysis Beltran et al. [79] Design a semantic service creation platform A semantic web service platform SIoT Helal et al. [80] Generate realistic datasets PerSim 3D IoT Cicirelli et al. [81] Implement social and pervasive smart environments iSapiens SIoT Cicirelli et al. [82] An Edge-based Platform for Dynamic Smart City Applications iSapiens IoT Shen Chen et al. [83] Design a new platform for SIoT IoT – SIoT Designing a smart environment test bed for Santander smart city SmartSantander IoT Zhang et al. [85] Architecture design for Social Web of Things – SWoT Pasha [102] Using Thingspeak to monitoring IoT systems Thingspeak IoT Sanchez et al. [84] Dataset Table 16 presents different types of datasets based on their features and URLs. – CRAWDAD: this dataset is a community to aggregate wireless network data resources and stores this data from many different locations to collect and analyze them.25 Many contributions to this dataset are explained in Table 16. – Reality Mining Dataset: this dataset is a collection of one hundred human subjects in nine months and presents information on users’ location, communication, and device usage behavior.26 – Washington State University’s CASAS Dataset: the CASAS project described the real smart environment and sensors as intelligent agents that can provide a safer and more comfortable life in our environment by gathering vital information from our surrounding environment by using these smart devices [86]. This dataset is divided into many different categories based on their usage like Real-Time Smart Home Stats, Assisted Care Apartments Real-Time Activity Update, etc. – SNAP: Stanford Large Network Dataset is a huge collection of different datasets in various scopes, for example, social networks dataset that is related to online SNs interaction between different users and has many subsets like Brightkite or Epinion. Discussion In previous sections, we provide a comprehensive description of all aspects of SIoT that, based on them, some research questions were presented. In this section, we answer these questions based on statistical and comparative analysis of these technical questions. RQ1: What target platforms, datasets are there for SIoT? 25 https://crawdad.org/. 26 http://realitycommons.media.mit.edu/realitymining1.html. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 31 of 40 Table 16 Related datasets Provider Dataset Feature CRAWDAD cambridge/haggle Objects Relationship https://crawdad.org/cambridge/haggle/20090 529/ cambridge/inmotion Location-based https://crawdad.org/cambridge/inmot ion/20051001/ buffalo/phonelab-wifi Wifi scan https://crawdad.org/buffalo/phonelabwifi/20160309/ columbia/kinetic Energy-awareness https://crawdad.org/columbia/kinetic/20140 513/ columbia/enhants Energy-awareness https://crawdad.org/columbia/enhants/20110 407/ cmu/hotspot Location-based https://crawdad.org/cmu/hotspot/20090415/ BitTorrent Traffic Bittorent traffic https://crawdad.org/snu/bittorrent/20110125/ copelabs/usense Social interaction https://crawdad.org/copelabs/usense/20170 127 upb/hyccups Social interaction https://crawdad.org/keyword-social-netwo rk.html MassaReality Mining Data on chusetts human mobility–MIT Institute of Dataset Technology Community-based http://realitycommons.media.mit.edu/reali tymining1.html Washington State Universities CASAS Dataset – http://casas.wsu.edu/datasets/ SNAP Facebook Social circles http://snap.stanford.edu/data/egonets-Faceb ook.html Brightkite Location-based https://snap.stanford.edu/data/loc-brightkite .html Google web graph Hyperlinks https://snap.stanford.edu/data/web-Googl e.html Gnutella peer-to-peer File sharing https://snap.stanford.edu/data/p2p-Gnutella31 .html Gowalla dataset Location-based http://snap.stanford.edu/data/loc-gowalla.html Gplus dataset Social circles https://snap.stanford.edu/data/ego-Gplus.html Epinion Trust Manager https://snap.stanford.edu/data/soc-Epinions1. html Authors Profiling [103] – URL RM evaluation factors Efficiency Connectivit 7% y 7% TM evaluation factors Scalability 6% Scalability 29% Resiliency 25% Stability 7% Cost 6% Time 6% Reliability 13% Adaptabilit y 14% Time 14% Navigabilit y 22% Accuracy 25% Adaptability 19% Fig. 7 Left-side: Main evaluation parameters in RM, Right-Side: Main evaluation parameters in TM based on studied literature Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 32 of 40 Information evaluation factors Services evaluation factors 5% 2% 12% 7% Time 23% 25% 9% Scalability 19% Availability Cost Time 12% 16% Reliability Adaptability Throughput Efficiency 12% 19% 14% Flexibility 25% Accuracy Energy Fig. 8 Left-side: Main evaluation parameter in web services based-on service discovery, service selection and service composition, Right-side: Main evaluation parameter in Information according to reviewed papers Protégé NetworkX Python 3% 3% 2% ONE 5% Java-based tools 28% Contiki 5% SocNetV 5% Gephi 8% NS3 8% SWIM 13% Matlab 10% Apache Hadoop 10% Fig. 9 Percentage of the simulation tools in studied articles Based on “SIoT Tools”section, we provide a comprehensive overview of all IoT and SIoT platforms and datasets. We present their features and targets absolutely in separate Tables (14, 15, and 16). RQ2: What evaluation parameters are essential for the core elements of SIoT? Figure 7 presents the main evaluation metrics in RM (left-side) and TM (right-side) that, based on it, in RM scalability is the most considered metrics by about 29%. Then navigability has 22%, time and adaptability have 14%, and finally, the stability, connectivity, and efficiency by 7% for each of them are evaluated more than other factors and in TM accuracy and resiliency are the most considered metrics by 25% (for each of them). Then adaptability has 19%, and reliability has 13% that they are considered more than others, and finally, scalability, cost, and time have 6% that was assessed as less concentrated in literature. Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Page 33 of 40 Possible solutions Challenges - Using POR object relationship Heterogeneity - Using middleware (interface) for non-POR objects - Discovering policies for objects identication - Objects movement (use Euclidean distance , GPS functions, SWIM model and …) - Social Similarities - Social Behaviors - Common Interests - Create objects communities Distinct features - Dynamic behavior of objects Manage changes by owner rules and protocols Mobility and Dynamicity - Graph model Tracking objects Based on objects social behavior - Determine rules (construction, update or end a relationship rules) - Using objects movement patterns GPS, 3D location-based approaches - Access control system (prevent unauthorized access) - Effective encryption mechanism (encrypt data safety) Security, Trust, and Privacy - Trust management framework - Safe data sharing model - Predicting nodes behaviors - Effective resource management system Resource-constrained devices - No optimal solution to address this problem - Using a mechanism to control overhead Efficient service search and discovery - Using new searching algorithms Fig. 10 SIoT main challenges and possible solutions According to Fig. 8, web services (left-side) were considered based on their essential evaluation factors, which is the most important factor by 23%. Then scalability has 16%, and availability has 14% that are considered more than others. Reliability and cost have 12%; adaptability, flexibility, security, and interoperability by 9%, 7%, 5%, and 2% are at the next levels. Due to this, the primary evaluation parameters in SIoT information (right-side) was investigated and according to it, throughput and time are the most important metrics that have 25% for each of them, accuracy and efficiency have 19%, and finally, energy is at the last position by 12 percent. RQ3: What simulation tools are used to simulate the main structure of SIoT? Figure 9 shows the statistical percentage of the simulation tools applied in the studied literature. The Java-based tools like Eclipse have the most percentage in simulation tools in reviewed studies with 28%. The SWIM simulator has 13% usage for simulation (especially in RM), and Apache Hadoop (especially for data processing in SIoT) and MATLAB toolkit has 10% of usage commonly in literature. Challenges of SIoT Many challenges in the SIoT can be significantly crucial for researchers to address new solutions for them. In Fig. 10 we listed the main challenges with their possible solutions Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 that they are not considered exactly in the reviewed articles, and we illustrate all of them as follows: RQ4: What are the most important challenges of the SIoT? • Heterogeneity: SIoT is made up of millions of objects with different features in sources, platforms, protocols, and standards, and all objects and data must be recoverable [87]. These differences have led to the creation of a heterogeneous network of objects that affect their interaction and compatibility directly with each other and increase complexity [87], so that the heterogeneity nature of objects leads to many important problems like interoperability and compatibility that need solutions to solve them [9], such as: • Using POR objects relationship: the parental objects can be used in such systems to ensure compatibility between them because all objects are homogenous and compatible with each other. • Using middleware (interface) for non-POR objects: in contrast for other objects that are not homogeneous, can be worked on a suitable middleware as an interface to communicate and adapt them by enhancing the communicability, applicability, practicability, and operability of devices without considering models or manufacturers [88]. • Discovering object identification policies: We need new addressing solutions for finding device identification [87]. • Mobility and Dynamicity: smart objects placed in a dynamic environment are constantly changing their location, which leads to problems such as lack of effective object search for selecting and providing services. The other important issue is the dynamic behavior of objects and environments, which leads to a change in the state of objects. So, the objects alter their status in the network. Some solutions proposed for these issues, such as: • Create objects communities: for solving mobility, groups of objects can be formed into communities based on distinct features like their movement, social behaviors, social similarities [89], and common interests to interact with each other [90]. When an object changes its position, the structure of the community alters based on this displacement. Therefore, we can use some functions like Euclidean, adjacent matrix, or Global Positioning System (GPS) to get the current location of objects for calculating their distance or using the SWIM27 model for modeling their mobility [90], which is used to generate location-based traces for the SIoT objects [91]. • Manage dynamic behavior of objects: for solving this issue, objects need to dedicate some main rules and protocols by their owners to manage these changes to prevent from changing the network topology, although adaptability is the other issue that arises from this dynamicity because an object needs to adapt itself with these frequent changes. 27 Small World In Motion. Page 34 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 • Tracking objects: one of the main issues in SIoT and large scale networks that were considered rarely is tracking objects, interactions, and activities. We can propose some solution for solving this problem such as: • Using a graph model: we can present a graph model for smart object interactions based on following objects’ social behaviors. • Determine rules: some rules must define to construct, update, predict, or remove the edges between two objects. Each object can be considered the main node. Their connection with together creates their edges. Their behaviors add weight to it according to the type and feature of a pair of objects relationship like common interest, providing a specific service/services, same location, etc. • Using objects movement patterns: Zhiyuan et al. [92] proposed Resource Discovery based on Preference and Movement Similarity (RDPM) for tracking objects movement patterns using GPS and three-dimensional location approach. • Security, Trust, and Privacy: because of a huge connected environment of devices, opportunistic services, and users in SIoT [51], security is an essential key to share information guardedly. So, contrary to many types of research that have been done in this field, it remains as one of the significant challenges and requires handling for the survival of the system in the face of various attacks to have security, reliability, availability, resiliency in interactions [9]. So there are some solutions to this problem, such as: • Access control system: we need a control system to prevent unauthorized access to data. • Effective encryption mechanism: We can also use an effective encryption mechanism to encrypt data reliably or use cost-effective and self-synchronizing models [50] to secure real identities from attacks. • Trust management framework: moreover, we can work on the SIoT trust management framework [43] to provide new applications for making trust between objects and users. • Safe data sharing model: We can also create privacy-preserving user and object communities based on policies to form a dynamic and safe data sharing model for more security and privacy [50]. • Predicting node behaviors: We can use some techniques like machine learning [26] and decision tree for predicting nodes behaviors [95]. • Resource-constrained devices: even though the SIoT is a system with limited resources and this issue has a direct impact on the life of the network and the exchange of information, there is still no optimal solution to address this issue by considering energy limitations at all levels of design to have more effective interactions [9]. Therefore, we need more studies and research to create an effective resource management system [93] on the SIoT to get the most out of such a system. Page 35 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 • Effective resource management system: due to the mobility nature of objects, which leads to much more computation power and energy in this system, we need an effective resource management system for solving it. • Efficient service search and discovery: the large number of objects in SIoT led to lower scalability and navigability for selecting friendships, searching services, and making an appropriate connection between objects. This issue increases the overhead at all levels of the SIoT system. So one of the main issues is the effective search and discovery of the services, which leads to a reduction in system overhead, provision of services with greater efficiency [52], better response time, decrease objects transactions time, and increase the navigability and scalability of the network [94, 95]. So there are some solutions to this problem, such as: • Using a mechanism to control overhead: we need a mechanism to control overhead and effectively search for services and resources, such as creating communities of objects based on main parameters such as social similarities [90], providing similar services, resources, other similarity measurements [49]. • Using new searching algorithms: in [90], they used intracommunity and intercommunity service search algorithms between detected local and global communities to discover services efficiently [90]. Conclusion This article delineates a comprehensive systematic literature overview of SIoT. First, we provide a brief background on SIoT. Second, we have collected data from a large collection of previous works. We propose working methods, paper extraction methods, and research question design to explore open topics and challenges of evaluating the data collected. We reviewed related articles published between 2011 and December 2019 in English and ISI journals. In the end, about 55 articles were selected for statistical and technical analysis, focusing on the main structures of SIoT. In the third, we developed a technical classification of the core structure of the SIoT ecosystem, which includes six sub-categories: architecture, relation management, trust management, web service process, related information, and tools (platform and dataset) and shows the elements one by one perfectly to highlight its strengths and weaknesses and express its main idea. Also, this study can be created and used for future work to test more closely and accurately the critical elements of SIoT, such as trust management, relationship management, and friendship selection. It could also explore it for future research in promising areas such as smart grids, smart cities, and smart industries. There are many challenges in this area that need to be thoroughly explored, and we will keep them as future work. Acknowledgements Not applicable. Authors’ contributions All authors contributed equally to this manuscript. All authors read and approved the final manuscript. Funding No funding was received. Availability of data and materials Not applicable. Competing interests There is no conflict of interest. Page 36 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 Author details 1 Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran. 2 Department of Computer Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran. 3 Department of Computer Science, University of Human Development, Sulaymaniyah, Iraq. 4 Department of Computer Science, University of Sulaimani, Sulaymaniyah, Iraq. Received: 16 March 2020 Accepted: 5 November 2020 References 1. Mardini W, Khamayseh Y, Khatabeh MH Genetic Algorithm for friendship selection in Social IoT. International Conference on Engineering & MIS (ICEMIS), 2017 2. Efremov S, Pilipenko N, Voskov L (2015) An integrated approach to common problems in the internet of things. Procedia Eng 100:1215–1223 3. Lee SE, Choi M, Kim S (2017) How and what to study about IoT: research trends and future directions from the perspective of social science. Telecommun Policy 41(10):1–12 4. Colakoviˇ A, Hadzialicˇ M (2018) Internet of Things (IoT): a Review of Enabling Technologies, Challenges, and Open Research Issues. Comput Netw 144:17–39 5. Rho S, Chen Y (2018) Social Internet of Things: applications, architectures, and protocols. Future Gener Comput Syst 82:667–668 6. https://growthenabler.com/ 7. Kleinberg J. The small-world phenomenon: An algorithmic perspective. Proceedings of the thirty-second annual ACM symposium on theory of computing, pp 163–170, 2000 8. Ma R, Wang K, Qiua T, Sangaiah AK, Lin D, Bin Liaqat H (2017) Feature-based compositing memory networks for aspect-based sentiment classification in social internet of things. Future Gener Comput Syst 92:879–888 9. Tripathy BK, Dutt D, Tazivazvino Ch. On the Research and development of Social Internet of Things. Internet of Things (IoT) in 5G Mobile Technologies, 8, pp 153–173, 2016 10. Abdelghani W, Zayani C.A, Amous I, Florence S. Trust Management in Social Internet of Things: A Survey. Dwivedi Y. et al. (eds) Social Media: The Good, the Bad, and the Ugly. I3E 2016. Lecture Notes in Computer Science, 9844, pp 430–441, 2016 11. Roopa MS, Pattar S, Buyya R et al (2019) Social Internet of Things (SIoT): foundations, thrust areas, systematic review and future directions. Comput Commun 139:32–57 12. White G, Nallur V, Clarke S (2017) Quality of service approaches in IoT: a systematic mapping. J Syst Softw 132:186–203 13. Fremantle P, A reference architecture for the Internet of Things, WSO2, 2015 14. Guth J, Breitenbucher U, Falkenthal M, Fremantle P, Kopp O, Leymann F, Reinfurt L (2018) A detailed analysis of IoT platform architectures: concepts, similarities, and differences. Springer, Berlin 15. Ganchev I, Ji Zh, O’Droma M, A Generic IoT architecture for smart cities, 25th IET Irish Signals & Systems conference (IEEE), 2014 16. Ortiz AM, Hussein D, Park S, Han S, Crespi N (2014) The cluster between internet of things and social networks: review and research challenges. IEEE Internet Things. 1(3):206–215 17. Evangelos K, Nikolaos T, Anthony B (2011) Integrating RFIDs and smart objects into a unified internet of things architecture. Adv Internet Things 1:5–12 18. Mijic D, Varga E, Unified IoT platform Architecture Platforms as Major IoT Building Blocks, International Conference on Computing and Network Communication (CoCoNet)(IEEE), 2018 19. Vulpa A, Arseni Sc, Marcu I, Voicu C, Fratu O, Building a Unified Architecture for Security in IoT, Recent Advances in Information Systems and Technologies, WorldCIST, Springer 2017 20. Kim J.E, Fan X, Mosse D. Empowering End Users for Social Internet of Things. IoTDI ‘17 Proceedings of the Second International Conference on Internet-of-Things Design and Implementation, pp. 71-82, 2017 21. Atzori L, Iera A, Morabito G, Nitti M (2012) The Social Internet of Things (SIoT)—when social networks meet the internet of things: concepts architecture and network characterization. Comput Netw 56:3594–3608 22. Atzori L, Iera A, Morabito G (2011) SIoT: giving a social structure to the Internet of Things. IEEE Commun Lett. 15(11):1193–1195 23. Gulati N, Kaur PD (2019) When things become friends: a semantic perspective on the Social Internet of Things. Smart Innova Commun Comput Sci 670:149–159 24. Gulati N, Kaur PD (2019) Towards socially enabled internet of industrial things: architecture, semantic model and relationship management. Ad Hoc Netw 91:101869 25. Nitti M, Girau R, Atzori L (2014) Trustworthiness management in the Social Internet of Things. IEEE Trans Knowl Data Eng 26(5):1253–1266 26. Yang Y, Lichtenwalter RN, Chawla NV (2015) Evaluating link prediction methods. Knowledge and Information Systems. 45(3):751–782 27. Yao X, Chen Zh, Tian Y (2015) A lightweight attribute-based encryption scheme for the internet of things. Future Gener Comput Syst 49:104–112 28. Fu C et al (2018) Search engine: the social relationship driving power of Internet of Things. Future Gener Comput Syst 92:972–986 29. Eddy B, Oussama H (2018) Social relationship paradigm applied to object interactions in industrial IoT. IFAC Papers online 51(11):1391–1396 30. Wei D, Ning H, Qian Y, Zhu T (2018) Social relationship for physical objects. Distrib Sensor Netw 14(1):15 Page 37 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 31. Atzori L, Iera A, Morabito G. Making things socialize in the Internet- Does it help our lives? Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human? - Innovations for Future Networks and Services (K-2011), 2011 32. Fiske AP (1992) the four elementary forms of sociality: framework for a unified theory of social relations. Psychol Rev 99(4):689–723 33. Mohammadi V, Rahmani AM, Mohammed Darwesh A, Sahafi A (2019) Trust–based recommendation systems in Internet of Things: a systematic literature review. Human-centric Comput Inf Sci 9:21 34. Chiregi M, Navimipour NJ (2017) Journal of Service Science. Research. 9(1):1–30 35. Kowshalya M, Valarmathi ML (2017) Trust management in the Social Internet of Things. Wireless Pers Commun 96(2):2681–2691 36. Kurniawan A, Kyas M. A trust model-based Bayesian decision theory in large scale Internet of Things. IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 37. Nitti M. Managing the Internet of Things based on its Social Structure. Ph.D dissertation, 2013 38. Xiao H, Sidhu N, Christianson B. Guarantor and reputation based trust model for social internet of things. International Wireless Communications and Mobile Computing Conference (IWCMC), 2015 39. Chen R, Guo J, Bao F (2014) Trust Management for SOA-Based IoT and Its Application to Service Composition. IEEE Trans Serv Comput 9(3):482–495 40. Chen IR, Bao F, Guo J (2015) Trust-based service management for Social Internet of Thing systems. IEEE Trans Dependable Secure Comput 13(6):684–696 41. Chen I.R, Guo J, Bao F. Trust management for service composition in SOA-based IoT systems. IEEE Wireless Communications and Networking Conference (WCNC), 2014 42. Guo J, Chen I.R. A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems. IEEE International Conference on Services Computing, 2015 43. Kowshalya AM, Valarmathi ML (2017) Trust management for reliable decision making among social objects in the Social Internet of Things. IET Netw 6(4):75–80 44. Bao F, Chen I.R, Guo J. Scalable, adaptive and survivable trust management for community of interest based internet of things systems. IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), 2013 45. Sharma V et al (2018) Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things. Future Gener Comput Syst 92:758–776 46. Truong NB, Um TW, Lee GM (2016) A reputation and knowledge based trust service platform for trustworthy social internet of things. Innov Clouds, Internet Netw 47. Kokoris-Kogias E, Voutyras O, Varvarigou T, TRM-SIoT: A Scalable Hybrid Trust & Reputation Model for the Social Internet of Things, IEEE 2016 48. Sengupta J, Ruj S, Das Bit S, A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT, J Netw Comput Appl, 2019 49. Abderrahim OB, Elhedhili MH, Saidane L (2017) CTMS-SIoT: A Context-based Trust Management System for the Social Internet of Thigs, IEEE 50. Shen J, Tianqi Zh, Fushan W, Xingming S, Yang X (2017) Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things. IEEE Internet Things J 5(4):2526–2536 51. Bernabe JB, Hernández JL, Moreno MV Skarmeta Gomez AF (2014) Privacy-preserving security framework for a social-aware internet of things, In International conference on ubiquitous computing and ambient intelligence. Springer, Cham; pp 408–415 52. Khan WZ et al (2016) When social objects collaborate: concepts, processing elements, attacks and challenges. Comput Electr Eng 58:397–411 53. Bao F, Chen I.R. Dynamic trust management for internet of things applications. International workshop on Selfaware internet of things, Self-IoT ‘12, pp. 1–6, 2012 54. Noor T, Sheng Q, Alfazi A. Reputation attacks detection for effective trust assessment among cloud services. 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013 55. Kouicem A, Chibani A, Tari A, Amirat Y, Tari Z. Dynamic services selection approach for the composition of complex services in the web of objects. Internet Things (WF-IoT), pp. 298–303, 2014 56. Chen G, Huang J, Cheng B, Chen J. A Social Network Based Approach for IoT Device Management and Service Composition. IEEE World Congress on Services, pp 1–8, 2015 57. Garg S, Modi K, Chaudhary S (2016) A QoS-aware approach for runtime discovery, selection and composition of semantic web services. Web Inf Syst. 12(2):177 58. Butt TA, Phillips I, Guan L, Oikonomou G (2013) Adaptive and context-aware service discovery for the Internet of Things. NEW2AN/ruSMART, LNCS 8121, pp 36–47 59. Wei Q, Jin Z (2012) Service discovery for Internet of Things: A context-awareness perspective. Proceeding of the Fourth-Asia-Pacific Symposium on Internetware, 25 60. Xia H, Hu Ch, Xiao F, Cheng X, Pan Z (2019) An efficient social-like semantic-aware service discovery mechanism for large-Scale Internet of Things. Comput Netw 152:210–220 61. Klauck R, Kirsche M. Bonjour Contiki: A Case Study of a DNS-based Discovery Service for the Internet of Things, Journal of International Conference on Ad-Hoc Networks and Wireless, pp. 316–329, 2012 62. Shamszaman ZU, Ali MI (2018) Enabling cognitive contributory societies using SIoT: QoS aware real-time virtual object management. J Parallel Distrib Comput 123:61–68 63. Baker T, Asim M, Tawfik H, Aldawsari B, Buyya R (2017) An energy-aware service composition algorithm for multiple cloud-based IoT applications. Netw Comput Appl 89:96–108 64. Pallec ML, Mazouz MO, Noirie L. Physical-interface-based IoT service characterization. IoT’16 Proceedings of the 6th International Conference on the Internet of Things, pp 63–71, 2016 Page 38 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 65. Ma H, Wang A, Zhang M. A hybrid approach using genetic programming and greedy search for qos-aware web service composition. Transactions on Large-Scale Data-and Knowledge-Centered Systems XVIII, pp 180–205, 2015 66. Chatterjee S, Kumar Kan A, Gupta MP (2018) Success of IoT in smart cities of India: an empirical analysis. Gov Inf Q 35(3):49–361 67. Lakshmanaprabu SK, Shankar K, Khanna A, Gupta D, Rodrigues J, Pinheiro PR, Hugo V, Albuouerque V (2018) Effective features to classify big data using Social Internet of Things. Open Access IEEE 6:24196–24204 68. Hasan MZ, Al-Turjman F (2017) SWARM-based data delivery in Social Internet of Things. Future Gener Comput Syst 92:821–836 69. Ahmad A, Khan M, Paul A, Din S, Rathore MM, Jeon G, Chio GS (2017) Towards modeling and optimization of features selection in Big Data based social Internet of Things. Future Gener Comput Syst 82:715–726 70. Alam F, Mehmood R, Katib I, Albeshri A (2016) Analysis of eight data mining algorithms for smarter Internet of Things (IoT). Procedia Comput Sci 98:437–442 71. Ahmad A (2016) Student Research Abstract: Social Element of Big Data Analytics: Integrating Social Network with the Internet of Things. SAC 72. Hejazi H, Rajab H, Cinkler T, Lengyel L (2018) Survey of Platforms for Massive IoT. IEEE International Conference on Future IoT Technologies (Future IoT) 73. Ahmed E, Yaqoob I, Abaker I, Hashem T, Khan I, Ibrahim A, Ahmed A, Imran M, Vasilakos A (2017) The role of big data analytics in Internet of Things. Comput Netw 129(2):459–471 74. Shadroo Sh, Rahmani AM (2018) Systematic survey of big data and data mining in Internet of Things. Comput Netw 139:19–47 75. Byun J, Kim S.H, Kim D. Lilliput: Ontology-Based Platform for IoT Social Networks. International Conference on Services Computing (SCC), pp. 139–146, 2014 76. Pintus A, Carboni D, Piras A (2012) Paraimpu: a Platform for a Social Web of Things. WWW ‘12 Companion Proceedings of the 21st International Conference on World Wide Web, Pages 401–404 77. Girau R, Nitti M, Atzori L (2013) Implementation of an Experimental Platform for the Social Internet of Things. Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp 500–505 78. Girau R, Martis S, Atzori L (2016) Lysis: a platform for IoT distributed applications over socially connected objects. IEEE Internet of Things J 4(1):40–51 79. Beltran V, Ortiz A.M, Hussein D, Crespi N (2014) A semantic service creation platform for social IoT. IEEE World Forum on Internet of Things (WF-IoT), pp 283–286 80. Helal A, Cho K, Lee W, Sung Y, Lee J, Kim E (2012)s 3D modeling and simulation of human activities in smart spaces. International Conference on Ubiquitous Intelligence and Computing, pp 112–119s 81. Cicirelli F, Guerrieri A, Spezzano G, Vinci A, Briante O, Ruggeri G (2016) iSapiens: A Platform for Social and Pervasive Smart Environments. IEEE 3rd World Forum on Internet of Things (WF-IoT) 82. Cicirelli F, Guerrieri A, Spezzano G, Vinci A (2017) An edge-based platform for dynamic smart city applications. Future Gener Comput Syst 76:106–118 83. Chen B.Sh, Kshirsagar V.A, Lo Sh.Ch. Platform Design for Social Internet of Things. IEEE International Conference on Consumer Electronics (ICCE-TW), 2017 84. Sanchez L, Munoz L, Galache JA, Sotres P, Santana JR, Gutierrez V, Ramdhany R, Gluhak A, Krco S, Theodoridis E, Pfisterer D (2013) SmartSantander: ioT experimentation over a smart city testbed. Comput Netw 61:217–238 85. Zhang C, Cheng C, Ji Y (2012) Architecture Design for Social Web of Things. International Workshop on Context Discovery and Data Mining, ContextDD’12, 3 86. Cook D, Das S (eds) (2004) Smart Environments: Technology, Protocols, and Applications. Wiley, Hoboken 87. Ray, P.P., A Survey on Internet of Things Architectures, Journal of King Saud University - Computer and Information Sciences, 2016 88. Asghari P, Rahmani AM, Javadi HHS (2018) Service composition approaches in IoT: a systematic review. Netw Comput Appl. 120:61–77 89. Girolami M, Barsocchi P, Chessa S, et al (2013) A social- based service discovery protocol for mobile ad hoc networks. 12th Annual Mediterranean Ad Hoc Networking Workshop, pp 103–110 90. Kowshalya AM, Gao XZ, Valarmathi ML (2019) Efficient service search among Social Internet of Things through construction of communities, Efficient service search among Social Internet of Things through construction of communities, Cyber-Physical Systems 91. Mei A, Stefa J (2009) SWIM: A simple model to generate small mobile worlds. IEEE INFOCOM, pp 2106–2113 92. Zhiyuan L, Chen R, Liu L et al (2016) Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things. IEEE Internet Things 3(4):581–589 93. Nitti M, Pilloni V, Colistra G, Atzori L (2015) The virtual object as a major element of the Internet of Things: a survey. IEEE Commun Surv Tutor 18(2):1228–1240 94. Nitti M, Atzori L, Cvijikj IP (2014) Network navigability in the Social Internet of Things. IEEE World Forum on Internet of Things, pp 405–410 95. Meena KA, Valarmathi ML (2016) Community detection in the social internet of things based on movement, preference and social similarity. Stud Inf Control 25(4):499–506 96. Voutyras O, Bourelos P, Kyriazis D, Varvarigou T. An Architecture Supporting Knowledge Flow in Social Internet of Things Systems. Proceedings of 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp 100–105, 2014 97. Dutta D, Tazivazvino Ch, Das S, Tripathy B.K. Social Internet of Things (SIoT): Transforming smart object to social object. NCMAC Conference, 2015 98. Ling R, Chen Z, Huang CM, Zhu X (2015) A scheme of access service recommendation for the social internet of things. Commun Syst 29(4):694–706 Page 39 of 40 Malekshahi Rad et al. Hum. Cent. Comput. Inf. Sci. (2020) 10:52 99. Bachi G, Coscia M, Monreale A, Giannotti F. Classifying trust/distrust relationships in online social networks. SocialCom-PASSAT, 2012 100. Liu Z, Guo S, Wang L, Du B, Pang S (2018) A multi-object service composition recommendation method for individualized customer: hybrid MPA-GSO-DNN model. Comput Ind Eng. 128:122–134 101. Mayer S, Guinard D. An Extensible Discovery Service for Smart Things. WoT ‘11, proceedings of the Second International Workshop on Web of Things, 2011 102. Pasha S (2016) ThingSpeak based sensing and monitoring system for IoT with Matlab Analysis. New Technol Res 2(6):19–23 103. Leppink J, Pérez-Fuster P (2018) Social networks as an approach to systematic review. Health Prof Educ. https://doi. org/10.1016/j.hpe.2018.09.002 Publisher’s Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Page 40 of 40