Cluster Computing

, Volume 22, Supplement 6, pp 14339–14348 | Cite as

Research on the trusted protection technology of internet of things

  • Zhenhu Ning
  • Yongli YangEmail author
  • Yahao Zhang


Current studies on security of IOT are mainly concentrated in the detection and control of behaviors of sensing nodes and neglect the protection of the key components of sensing nodes. So that sensor nodes may be destroyed and don’t function when malicious behaviors are detected. To solve this problem, in this paper, we apply trusted computing to study the security of Internet of things and propose the trusted immune system of the sensing network. The trusted immune system not only just guarantee the trust of behaviors of sensing nodes, but also guarantee the trust of the key components of sensing nodes. By implementing immune surveillance, immune defense and immune homeostasis, the trusted immune system of the sensing network provides initiatively immune support for the sensing network combining with macro and micro.


Internet of things Sensing network Trusted immune system Initiative measurement 



This work was sponsored by National Natural Science Foundation of China, grants no.61501007, Beijing Postdoctoral Research Foundation (2017-22-030)and CCF-Venustech Open Research Fund (CCF-VenustechRP2017008).


  1. 1.
    Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)CrossRefGoogle Scholar
  2. 2.
    Int’l Telecommunication Union, Telecommunication Standardization Section (ITU-T). Next generation networks-Frameworks and functional architecture models-Overview of the Internet of things. Recommendation ITU-T Y. 2060, Geneva: ITU 2013Google Scholar
  3. 3.
    Singh, D., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: Future vision, architecture, challenges and services. Internet of Things. IEEE, pp. 287–292 (2014)Google Scholar
  4. 4.
    Perera, C., Zaslavsky, A., Liu, C.H., et al.: Sensor search techniques for sensing as a service architecture for the internet of things. IEEE Sens. J. 14(2), 406–420 (2013)CrossRefGoogle Scholar
  5. 5.
    Palattella, M.R., Accettura, N., Vilajosana, X., et al.: Standardized protocol stack for the internet of (important) things. IEEE Commun. Surv. Tutor. 15(3), 1389–1406 (2013)CrossRefGoogle Scholar
  6. 6.
    Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. Int. J. Comput. Telecommun. Netw. 76(C), 146–164 (2015)CrossRefGoogle Scholar
  7. 7.
    Bernabe, J.B., Ramos, J.L.H., Gomez, A.F.S.: TACIoT: multidimensional trust-aware access control system for the internet of things. Soft. Comput. 20(5), 1763–1779 (2016)CrossRefGoogle Scholar
  8. 8.
    Sato, H., Kanai, A., Tanimoto, S., et al.: Establishing Trust in the Emerging Era of IoT. Service-Oriented System Engineering. IEEE, pp. 398–406 (2016)Google Scholar
  9. 9.
    Chen, I.R., Guo, J., Bao, F.: Trust management for SOA-Based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2017)CrossRefGoogle Scholar
  10. 10.
    Kim, Y., Kim, Y., Chang, H.: An empirical study on security expert ecosystem in the future IoT service environment. Pergamon Press Inc, Oxford (2016)Google Scholar
  11. 11.
    Hossain, M.S., Muhammad, G., Rahman, S.M.M., et al.: Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wireless Commun. 23(5), 44–51 (2016)CrossRefGoogle Scholar
  12. 12.
    Qiu, Y., Chen, Z., Xu, L.: Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory. In: International Conference on Wireless Communications Networking and Mobile Computing. IEEE, 1–4 (2010)Google Scholar
  13. 13.
    He, W., Xia, C., Wang, H., et al.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering. IEEE Computer Society, 498–504 (2008)Google Scholar
  14. 14.
    Hong, T.Z.H.: Evaluating network security and optimal active defense based on attack-defense game model. Chin. J. Comput. 32(4), 817–827 (2009)CrossRefGoogle Scholar
  15. 15.
    Agah, A., Basu, K., Das, S.K.: Preventing DoS attack in sensor networks: a game theoretic approach. In: IEEE International Conference on Communications. IEEE, Vol. 5, pp. 3218–3222 (2005)Google Scholar
  16. 16.
    Chen, Z., Qiao, C., Qiu, Y., et al.: Dynamics stability in wireless sensor networks active defense model. J. Comput. Syst. Sci. 80(8), 1534–1548 (2014)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Chen, S., Wang, G., Jia, W.: Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. Future Gener. Comput. Syst. 55, 391–400 (2014)CrossRefGoogle Scholar
  18. 18.
    Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. Achi. 98–104 (2011)Google Scholar
  19. 19.
    Kim, S., Han, S.: The method of inferring trust in Web-based social network using fuzzy logic. In: Proceedings of the International Workshop on Machine Intelligence Research pp. 140–144 (2009)Google Scholar
  20. 20.
    Shi, W.: On Design of a Trusted Software Base with Support of TPCM. Trusted Systems. pp. 1–15 Springer, Berlin Heidelberg (2009)Google Scholar
  21. 21.
    Park, S., Won, J.J., Yoon, J., et al.: A tiny hypervisor-based trusted geolocation framework with minimized TPM operations. J. Syst. Softw. 122, 202–214 (2016)CrossRefGoogle Scholar
  22. 22.
    Srinivas, J., Mukhopadhyay, S., Mishra, D.: Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Elsevier, Amsterdam (2017)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Faculty of Information TechnologyBeijing University of TechnologyBeijingChina
  2. 2.Beijing Key Laboratory of Trusted ComputingBeijingChina

Personalised recommendations