Research on the trusted protection technology of internet of things
- 88 Downloads
Current studies on security of IOT are mainly concentrated in the detection and control of behaviors of sensing nodes and neglect the protection of the key components of sensing nodes. So that sensor nodes may be destroyed and don’t function when malicious behaviors are detected. To solve this problem, in this paper, we apply trusted computing to study the security of Internet of things and propose the trusted immune system of the sensing network. The trusted immune system not only just guarantee the trust of behaviors of sensing nodes, but also guarantee the trust of the key components of sensing nodes. By implementing immune surveillance, immune defense and immune homeostasis, the trusted immune system of the sensing network provides initiatively immune support for the sensing network combining with macro and micro.
KeywordsInternet of things Sensing network Trusted immune system Initiative measurement
This work was sponsored by National Natural Science Foundation of China, grants no.61501007, Beijing Postdoctoral Research Foundation (2017-22-030)and CCF-Venustech Open Research Fund (CCF-VenustechRP2017008).
- 2.Int’l Telecommunication Union, Telecommunication Standardization Section (ITU-T). Next generation networks-Frameworks and functional architecture models-Overview of the Internet of things. Recommendation ITU-T Y. 2060, Geneva: ITU 2013Google Scholar
- 3.Singh, D., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: Future vision, architecture, challenges and services. Internet of Things. IEEE, pp. 287–292 (2014)Google Scholar
- 8.Sato, H., Kanai, A., Tanimoto, S., et al.: Establishing Trust in the Emerging Era of IoT. Service-Oriented System Engineering. IEEE, pp. 398–406 (2016)Google Scholar
- 10.Kim, Y., Kim, Y., Chang, H.: An empirical study on security expert ecosystem in the future IoT service environment. Pergamon Press Inc, Oxford (2016)Google Scholar
- 12.Qiu, Y., Chen, Z., Xu, L.: Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory. In: International Conference on Wireless Communications Networking and Mobile Computing. IEEE, 1–4 (2010)Google Scholar
- 13.He, W., Xia, C., Wang, H., et al.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering. IEEE Computer Society, 498–504 (2008)Google Scholar
- 15.Agah, A., Basu, K., Das, S.K.: Preventing DoS attack in sensor networks: a game theoretic approach. In: IEEE International Conference on Communications. IEEE, Vol. 5, pp. 3218–3222 (2005)Google Scholar
- 18.Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. Achi. 98–104 (2011)Google Scholar
- 19.Kim, S., Han, S.: The method of inferring trust in Web-based social network using fuzzy logic. In: Proceedings of the International Workshop on Machine Intelligence Research pp. 140–144 (2009)Google Scholar
- 20.Shi, W.: On Design of a Trusted Software Base with Support of TPCM. Trusted Systems. pp. 1–15 Springer, Berlin Heidelberg (2009)Google Scholar