Abstract
With the rapid development of the Internet of Things (IoT) technology in the information society, how to meet the urgent requirements of current users for trusted transmission services is a research hot-spots in the field of the IoT industry. In view of the research status on security authentication in IoT, a security authentication technology based on dynamic Bayesian network combined with trusted protocol is proposed in this paper. Through the introduction of the trusted measurement and the combined public key-based security authentication mechanism in the network, it enhances the security information exchange and considers the node credibility and the path reliability in the routing decision so as to choose a high secure and trusted path for information transmission in IoT. The evaluation results showed that our algorithm achieves a much better security performance than comparison algorithms in overhead and computational complexity for real time applications. In addition, our algorithm has also an adaptive capability and can quickly react to the denial of the service attack, which effectively suppress the threat of abnormal entity in the IoT.




Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Ammireddy A (2017) Method and system for efficient graceful restart in an open shortest path first (Open_SPF) network
Aris A, Oktug SF, Yalcin SBO (2015) Internet-of-Things security: denial of service attacks, pp 903–906
Bamasag O, Toumi KY (2016) Efficient multicast authentication in Internet of Things. In: International conference on information and communication technology convergence. IEEE, Piscataway, pp 429–435
Chang KD, Chen JL (2012) A survey of trust management in WSNS, Internet of Things and future Internet. KSII Trans Internet Inf Syst 6(1):5–23
Gang G, Lu Z, Jiang J (2011) Internet of Things security analysis. In: International conference on internet technology and applications. IEEE, Piscataway, pp 1–4
Gong B, Zhang Y, Wang Y (2017) A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener Comput Syst 78:867–886
Gong B, Wang Y, Liu X et al (2018) A trusted attestation mechanism for the sensing nodes of Internet of Things based on dynamic trusted measurement. China Commun 15(2):100–121
Griffin PH (1992) Security for ambient assisted living: multi-factor authentication in the Internet of Things. In: IEEE GLOBECOM workshops. IEEE, Piscataway, pp 1–5
Kothmayr T, Schmitt C, Hu W et al (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11(8):2710–2723
Ma Z, Wang Z, Liang D et al (2017) A model of trusted measurement model, p 04023
Ndibanje B, Lee HJ, Lee SG (2014) Security analysis and improvements of authentication and access control in the Internet of Things. Sensors 14(8):14786–14805
Park N, Kang N (2015) Mutual authentication scheme in secure Internet of Things technology for comfortable lifestyle. Sensors 16(1):20
Rauter T, Iber J, Kreiner C (2016) Thingtegrity: a scalable trusted computing architecture for the Internet of Things. In: International conference on embedded wireless systems and networks. Junction Publishing, Toronto, pp 23–34
Sun X, Wang C (2011) The research of security technology in the Internet of Things. In: Advances in computer science, intelligent system and environment. DBLP, pp 113–119
Sun K, Quan LI, Xiaofeng XU et al (2017) Risk analysis on human factors in operation of high risk construction based on dynamic Bayesian network. J Hydroelectr Eng 36(5):28–35
Tamboli MB, Dambawade D (2017) Secure and efficient CoAP based authentication and access control for Internet of Things (IoT). In: IEEE international conference on recent trends in electronics, information and communication technology. IEEE, Piscataway, pp 1245–1250
Teng M, Li B, Zhai N (2017) Study on data security protection technology in Internet of Things. China Comput Commun
Wang L, Liu F (2018) A trusted measurement model based on dynamic policy and privacy protection in IaaS security domain. EURASIP J Inf Secur 2018(1):1
Wang L, Jiang S, Guo Y (2012) Composable-secure authentication protocol for mobile sensors roaming in the Internet of Things. Sci Sin 42(7):815
Wang J, Fan K, Mo W et al (2016) A method for information security risk assessment based on the dynamic Bayesian network. In: International conference on networking and network applications. IEEE, Piscataway, pp 279–283
Wu F, Xu L, Kumari S et al (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J Ambient Intell Humaniz Comput 8(1):101–116
Xiao Q, Liu S (2017) Motion retrieval based on dynamic bayesian network and canonical time warping. Soft Comput 2:1–14
Zhang Q, Feng D, Zhao S (2016) Research of platform identity attestation based on trusted chip. J Commun 35(8):95–106
Zhao YL (2013) Research on data security technology in Internet of Things. Appl Mech Mater 433–435:1752–1755
Ziegeldorf JH, Shafagh H, Raza S et al (2013) Towards viable certificate-based authentication for the internet of things. In: ACM workshop on hot topics on wireless network security and privacy. ACM, New York, pp 37–42
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, Q., Xu, D. Security authentication technology based on dynamic Bayesian network in Internet of Things. J Ambient Intell Human Comput 11, 573–580 (2020). https://doi.org/10.1007/s12652-018-0949-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0949-2