Skip to main content
Log in

Research on the trusted protection technology of internet of things

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Current studies on security of IOT are mainly concentrated in the detection and control of behaviors of sensing nodes and neglect the protection of the key components of sensing nodes. So that sensor nodes may be destroyed and don’t function when malicious behaviors are detected. To solve this problem, in this paper, we apply trusted computing to study the security of Internet of things and propose the trusted immune system of the sensing network. The trusted immune system not only just guarantee the trust of behaviors of sensing nodes, but also guarantee the trust of the key components of sensing nodes. By implementing immune surveillance, immune defense and immune homeostasis, the trusted immune system of the sensing network provides initiatively immune support for the sensing network combining with macro and micro.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)

    Article  Google Scholar 

  2. Int’l Telecommunication Union, Telecommunication Standardization Section (ITU-T). Next generation networks-Frameworks and functional architecture models-Overview of the Internet of things. Recommendation ITU-T Y. 2060, Geneva: ITU 2013

  3. Singh, D., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: Future vision, architecture, challenges and services. Internet of Things. IEEE, pp. 287–292 (2014)

  4. Perera, C., Zaslavsky, A., Liu, C.H., et al.: Sensor search techniques for sensing as a service architecture for the internet of things. IEEE Sens. J. 14(2), 406–420 (2013)

    Article  Google Scholar 

  5. Palattella, M.R., Accettura, N., Vilajosana, X., et al.: Standardized protocol stack for the internet of (important) things. IEEE Commun. Surv. Tutor. 15(3), 1389–1406 (2013)

    Article  Google Scholar 

  6. Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. Int. J. Comput. Telecommun. Netw. 76(C), 146–164 (2015)

    Article  Google Scholar 

  7. Bernabe, J.B., Ramos, J.L.H., Gomez, A.F.S.: TACIoT: multidimensional trust-aware access control system for the internet of things. Soft. Comput. 20(5), 1763–1779 (2016)

    Article  Google Scholar 

  8. Sato, H., Kanai, A., Tanimoto, S., et al.: Establishing Trust in the Emerging Era of IoT. Service-Oriented System Engineering. IEEE, pp. 398–406 (2016)

  9. Chen, I.R., Guo, J., Bao, F.: Trust management for SOA-Based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2017)

    Article  Google Scholar 

  10. Kim, Y., Kim, Y., Chang, H.: An empirical study on security expert ecosystem in the future IoT service environment. Pergamon Press Inc, Oxford (2016)

    Google Scholar 

  11. Hossain, M.S., Muhammad, G., Rahman, S.M.M., et al.: Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wireless Commun. 23(5), 44–51 (2016)

    Article  Google Scholar 

  12. Qiu, Y., Chen, Z., Xu, L.: Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory. In: International Conference on Wireless Communications Networking and Mobile Computing. IEEE, 1–4 (2010)

  13. He, W., Xia, C., Wang, H., et al.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering. IEEE Computer Society, 498–504 (2008)

  14. Hong, T.Z.H.: Evaluating network security and optimal active defense based on attack-defense game model. Chin. J. Comput. 32(4), 817–827 (2009)

    Article  Google Scholar 

  15. Agah, A., Basu, K., Das, S.K.: Preventing DoS attack in sensor networks: a game theoretic approach. In: IEEE International Conference on Communications. IEEE, Vol. 5, pp. 3218–3222 (2005)

  16. Chen, Z., Qiao, C., Qiu, Y., et al.: Dynamics stability in wireless sensor networks active defense model. J. Comput. Syst. Sci. 80(8), 1534–1548 (2014)

    Article  MathSciNet  Google Scholar 

  17. Chen, S., Wang, G., Jia, W.: Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. Future Gener. Comput. Syst. 55, 391–400 (2014)

    Article  Google Scholar 

  18. Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. Achi. 98–104 (2011)

  19. Kim, S., Han, S.: The method of inferring trust in Web-based social network using fuzzy logic. In: Proceedings of the International Workshop on Machine Intelligence Research pp. 140–144 (2009)

  20. Shi, W.: On Design of a Trusted Software Base with Support of TPCM. Trusted Systems. pp. 1–15 Springer, Berlin Heidelberg (2009)

    Google Scholar 

  21. Park, S., Won, J.J., Yoon, J., et al.: A tiny hypervisor-based trusted geolocation framework with minimized TPM operations. J. Syst. Softw. 122, 202–214 (2016)

    Article  Google Scholar 

  22. Srinivas, J., Mukhopadhyay, S., Mishra, D.: Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Elsevier, Amsterdam (2017)

    Book  Google Scholar 

Download references

Acknowledgements

This work was sponsored by National Natural Science Foundation of China, grants no.61501007, Beijing Postdoctoral Research Foundation (2017-22-030)and CCF-Venustech Open Research Fund (CCF-VenustechRP2017008).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongli Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ning, Z., Yang, Y. & Zhang, Y. Research on the trusted protection technology of internet of things. Cluster Comput 22 (Suppl 6), 14339–14348 (2019). https://doi.org/10.1007/s10586-018-2294-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-018-2294-9

Keywords

Navigation