A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things

  • Yubo Wang
  • Mowei GongEmail author
  • Bei Gong
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 960)


The Internet of Things connects a large number of real objects with the Internet through a variety of sensing technologies and it is a network that implements the concept of connected objects. However, as a new concept of network, because of its large number and variety of terminals, wide range of distribution, the traditional security mechanisms are not adapted to the Internet of Things (IoT) architecture, and the existed researches use the static information of sensing nodes to measure and judge the trust of sensing nodes. It results the real-time trust of Internet of Things hard to be judged. Therefore, this paper purposes a behavioral measurement model suitable for the sensing nodes of Internet of Things to make up the insufficient of existed sensing nodes measurement mechanism of Internet of Things. This model is designed for the Internet of Things, and bases on the identity authentication and the static measurement to measure the behavior of sensing nodes. It through designs different behavior measurement functions to assess and calculate the behavior of sensing nodes synthetically. According to divide the trusted level of sensing nodes, this model can defense the attacks, such as the node hijacking attack, the physical capture attacks and the denial of service attacks.


Internet of Things Security of sensing layer Behavioral measurement Trusted computing 



This work was supported by the Postdoctoral Fundation of Beijing (Grant No. 2018-22-025).


  1. 1.
    Zhang, Y., Zhou, W., Peng, A.: Safety review of the Internet of things. Comput. Res. Dev. 54(10), 2130–2143 (2015)Google Scholar
  2. 2.
    Zhang, Y.-J., Liu, I., Feng, L.: Internet information security and privacy protection and research review. J. Logist. Technol. 40(01), 69 (2017)Google Scholar
  3. 3.
    Ma, Z.: Trusted access wireless network theory and its application research. Xi ‘an University of Electronic Science and Technology (2010)Google Scholar
  4. 4.
    Wang, Y.: Key technology research on the trusted operation of the node of the IoT sensor. Beijing University of Technology (2017)Google Scholar
  5. 5.
    Zhuang, L., Shen, C.-X., Cai, M.: Based on the behavior of the trusted dynamic measurement of the state space reduction research. J. Comput. 5(5), 1071 (2014)Google Scholar
  6. 6.
    Li, X., Zuo, X.D., Shen, C.-X.: Based on the behavior of the system computing platform reliable proof. J. Electron. J. 7, 1234–1239 (2007)Google Scholar
  7. 7.
    Li, W., Zhang, T., Lin, W., Deng, S., Wang, C.: Security audit based on the reliability measurement of dynamic network behavior. Comput. Technol. Dev. 22(5), 250–253 (2012)Google Scholar
  8. 8.
    Zhang, J., Zhang, G., Zhang, X.: Network access control model based on real-time behavior trusted measurement. Comput. Appl. Softw. 7, 32–38 (2017)Google Scholar
  9. 9.
    Yan, L., Jia, X., Chen, P.: Software dynamic reliability measurement based on behavior trajectory. Comput. Appl. Res. 34(02), 539–542 (2013)Google Scholar
  10. 10.
    Liu, G., Zhou, Z., Zhou, R.: A static and trusted measurement model of software behavior. J. Naval Aviat. Eng. 27(04), 459–463 (2012)Google Scholar
  11. 11.
    Letian, S., et al.: Methods of sensitive information protection under the Internet of things. Sichuan Univ. J. Eng. Sci. Edn. 01, 132–138 (2016)Google Scholar
  12. 12.
    Chien, H., Chen, C.: Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computers and Standards (2007)Google Scholar
  13. 13.
    Zhou, Z., Li, J., Zhang, J.: A credible measurement model of principal behavior. Comput. Eng. 07, 35–37 (2008)Google Scholar
  14. 14.
    Yan, Z.: A Conceptual architecture of a trusted mobile environment. In: Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006)Google Scholar
  15. 15.
    Balfe, H., Chen, L.: Pervasive trusted computing. In: Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006) (2006)Google Scholar
  16. 16.
    Liang, L.: Sociological study on the behavior of dishonesty. Wuhan University (2014)Google Scholar
  17. 17.
    Sun, C.: Characteristics of super-high dimensional classification data based on conditional information entropy. Nanjing Information Engineering University (2017)Google Scholar
  18. 18.
    Peng, C., Ding, H., Zhu, Y., Tian, Y., Fu, Z.: Information entropy model of privacy protection and its measurement method. Softw. Sci. 27(8), 2016-1903 (2016)Google Scholar
  19. 19.
    Ge, H., Tate, S.R.: A direct anonymous attestation scheme for embedded devices. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 16–30. Springer, Heidelberg (2007). Scholar
  20. 20.
    Schryen, G., Volkamer, M., Ries, S., Habib, S.M..: A formal approach towards measuring trust in distributed systems, pp. 1739–1745 (2011)Google Scholar
  21. 21.
    Chen, I.-R., Guo, J.: Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection. In: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, pp. 49–56 (2014)Google Scholar
  22. 22.
    Mana, A., Koshutanski, H., Perez, E.J.: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput. Secur. 1, 4–25 (2011)Google Scholar
  23. 23.
    Wu, Q.-X.: Secure solution of trusted Internet of things base on TCM. J. China Univ. Posts Telecommun. 20, 47–53 (2013)CrossRefGoogle Scholar
  24. 24.
    Xu, X., Bessis, N., Cao, J.: An autonomic agent trust model for IoT systems. 21, 107–113 (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Beijing University of TechnologyBeijingChina

Personalised recommendations