A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems

被引:32
作者
Wang, Tian [1 ,2 ]
Li, Yang [3 ]
Fang, Weiwei [4 ]
Xu, Wenzheng [5 ]
Liang, Junbin [6 ]
Chen, Yewang [3 ]
Liu, Xuxun [7 ]
机构
[1] Beijing Normal Univ, Zhuhai 519000, Guangdong, Peoples R China
[2] BNU HKBU United Int Coll UIC, Zhuhai 519000, Guangdong, Peoples R China
[3] Huaqiao Univ, Xiamen 361000, Fujian, Peoples R China
[4] Beijing Jiaotong Univ, Beijing 100044, Peoples R China
[5] Sichuan Univ, Chengdu 610065, Peoples R China
[6] Guangxi Univ, Nanning 530004, Guangxi, Peoples R China
[7] South China Univ Technol, Guangzhou 510630, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
NETWORKS; SECURITY; INTERNET; IDENTITY;
D O I
10.1109/TBDATA.2018.2811501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, sensor-cloud systems have received wide attention from both academia and industry. Sensor-cloud system not only improves performances of wireless sensor networks (WSNs), but also combines different functional WSNs together to provide comprehensive services. However, a variety of malicious attacks threaten the sensor-cloud security, such as integrity, authenticity, availability and so on. Traditional available security mechanisms (e.g., cryptography and authentication) are still vulnerable. Although there are schemes to provide security by trust evaluation, the evaluation considers whether or not a sensor is credible only by checking the communication behaviors. Furthermore, when mobile sensor sinks are employed to collect sensing data, there appears a type of attacks called replicated sink attacks that are often ignored in the previous work. These attacks may bring serious vulnerability to trustworthy data collection in sensor-cloud systems. In this paper, we propose a comprehensive trustworthy data collection (CTDC) approach for sensorcloud systems. Three kinds of trust, i.e., direct trust, indirect trust, and functional trust are defined to evaluate the trustworthiness of both sensors and mobile sinks. Except for resisting malicious attacks, the performances of sensor-cloud, such as energy, transmission distance and network throughput are also considered. We also conduct extensive simulations to evaluate the efficiency of CTDC. The simulation results show that CTDC correctly identifies malicious nodes and offers an improved performance in the data collection.
引用
收藏
页码:140 / 151
页数:12
相关论文
共 35 条
  • [1] Security in Cloud-Computing-Based Mobile Health
    Albuquerque, Silas L.
    Gondim, Paulo R. L.
    [J]. IT PROFESSIONAL, 2016, 18 (03) : 37 - 44
  • [2] Dependable Structural Health Monitoring Using Wireless Sensor Networks
    Bhuiyan, Md Zakirul Alam
    Wang, Guojun
    Wu, Jie
    Cao, Jiannong
    Liu, Xuefeng
    Wang, Tian
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 363 - 376
  • [3] BHUNIA SS, 2015, P 2015 MOBISYS PHD F
  • [4] Chandra AA, 2013, INT CONF IT CONVERGE
  • [5] Decentralized Clustering by Finding Loose and Distributed Density Cores
    Chen, Yewang
    Tang, Shengyu
    Zhou, Lida
    Wang, Cheng
    Du, Jixiang
    Wang, Tian
    Pei, Songwen
    [J]. INFORMATION SCIENCES, 2018, 433 : 510 - 526
  • [6] Fu S., 2015, CRAWDAD DATASET DUEP
  • [7] Golbeck J. A., 2005, COMPUTING APPLYING T
  • [8] Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey
    Govindan, Kannan
    Mohapatra, Prasant
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02): : 279 - 298
  • [9] Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    [J]. AD HOC NETWORKS, 2015, 24 : 264 - 287
  • [10] Gupta A, 2016, CISC VIS NETW IND GL, V47, P1, DOI [10.1109/ssci.2016.7850038, DOI 10.1109/INDICON.2016.7838862]