Abstract
Current studies on security of IOT are mainly concentrated in the detection and control of behaviors of sensing nodes and neglect the protection of the key components of sensing nodes. So that sensor nodes may be destroyed and don’t function when malicious behaviors are detected. To solve this problem, in this paper, we apply trusted computing to study the security of Internet of things and propose the trusted immune system of the sensing network. The trusted immune system not only just guarantee the trust of behaviors of sensing nodes, but also guarantee the trust of the key components of sensing nodes. By implementing immune surveillance, immune defense and immune homeostasis, the trusted immune system of the sensing network provides initiatively immune support for the sensing network combining with macro and micro.
Similar content being viewed by others
References
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)
Int’l Telecommunication Union, Telecommunication Standardization Section (ITU-T). Next generation networks-Frameworks and functional architecture models-Overview of the Internet of things. Recommendation ITU-T Y. 2060, Geneva: ITU 2013
Singh, D., Tripathi, G., Jara, A.J.: A survey of Internet-of-Things: Future vision, architecture, challenges and services. Internet of Things. IEEE, pp. 287–292 (2014)
Perera, C., Zaslavsky, A., Liu, C.H., et al.: Sensor search techniques for sensing as a service architecture for the internet of things. IEEE Sens. J. 14(2), 406–420 (2013)
Palattella, M.R., Accettura, N., Vilajosana, X., et al.: Standardized protocol stack for the internet of (important) things. IEEE Commun. Surv. Tutor. 15(3), 1389–1406 (2013)
Sicari, S., Rizzardi, A., Grieco, L.A., et al.: Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. Int. J. Comput. Telecommun. Netw. 76(C), 146–164 (2015)
Bernabe, J.B., Ramos, J.L.H., Gomez, A.F.S.: TACIoT: multidimensional trust-aware access control system for the internet of things. Soft. Comput. 20(5), 1763–1779 (2016)
Sato, H., Kanai, A., Tanimoto, S., et al.: Establishing Trust in the Emerging Era of IoT. Service-Oriented System Engineering. IEEE, pp. 398–406 (2016)
Chen, I.R., Guo, J., Bao, F.: Trust management for SOA-Based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2017)
Kim, Y., Kim, Y., Chang, H.: An empirical study on security expert ecosystem in the future IoT service environment. Pergamon Press Inc, Oxford (2016)
Hossain, M.S., Muhammad, G., Rahman, S.M.M., et al.: Toward end-to-end biomet rics-based security for IoT infrastructure. IEEE Wireless Commun. 23(5), 44–51 (2016)
Qiu, Y., Chen, Z., Xu, L.: Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory. In: International Conference on Wireless Communications Networking and Mobile Computing. IEEE, 1–4 (2010)
He, W., Xia, C., Wang, H., et al.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering. IEEE Computer Society, 498–504 (2008)
Hong, T.Z.H.: Evaluating network security and optimal active defense based on attack-defense game model. Chin. J. Comput. 32(4), 817–827 (2009)
Agah, A., Basu, K., Das, S.K.: Preventing DoS attack in sensor networks: a game theoretic approach. In: IEEE International Conference on Communications. IEEE, Vol. 5, pp. 3218–3222 (2005)
Chen, Z., Qiao, C., Qiu, Y., et al.: Dynamics stability in wireless sensor networks active defense model. J. Comput. Syst. Sci. 80(8), 1534–1548 (2014)
Chen, S., Wang, G., Jia, W.: Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. Future Gener. Comput. Syst. 55, 391–400 (2014)
Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. Achi. 98–104 (2011)
Kim, S., Han, S.: The method of inferring trust in Web-based social network using fuzzy logic. In: Proceedings of the International Workshop on Machine Intelligence Research pp. 140–144 (2009)
Shi, W.: On Design of a Trusted Software Base with Support of TPCM. Trusted Systems. pp. 1–15 Springer, Berlin Heidelberg (2009)
Park, S., Won, J.J., Yoon, J., et al.: A tiny hypervisor-based trusted geolocation framework with minimized TPM operations. J. Syst. Softw. 122, 202–214 (2016)
Srinivas, J., Mukhopadhyay, S., Mishra, D.: Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Elsevier, Amsterdam (2017)
Acknowledgements
This work was sponsored by National Natural Science Foundation of China, grants no.61501007, Beijing Postdoctoral Research Foundation (2017-22-030)and CCF-Venustech Open Research Fund (CCF-VenustechRP2017008).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ning, Z., Yang, Y. & Zhang, Y. Research on the trusted protection technology of internet of things. Cluster Comput 22 (Suppl 6), 14339–14348 (2019). https://doi.org/10.1007/s10586-018-2294-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-018-2294-9