通信学报 ›› 2018, Vol. 39 ›› Issue (6): 37-51.doi: 10.11959/j.issn.1000-436x.2018098
修回日期:
2018-03-15
出版日期:
2018-06-01
发布日期:
2018-07-09
作者简介:
王田(1982-),男,湖南汨罗人,博士,华侨大学教授,主要研究方向为物联网及其安全问题、云计算技术、社交网络、软件安全、大数据处理等。|张广学(1992-),男,河南开封人,华侨大学硕士生,主要研究方向为雾计算、传感云、物联网及其安全问题等。|蔡绍滨(1973-),男,辽宁辽中人,博士,华侨大学教授、博士生导师,主要研究方向为物联网、海洋监测网络、网络计算、信息安全等。|贾维嘉(1957-),男,中国香港人,博士,上海交通大学教授、博士生导师,主要研究方向为下一代无线通信、协议、异构网络等。|王国军(1970-),男,湖南长沙人,博士,广州大学教授、博士生导师,主要研究方向为网络和信息安全、物联网和云计算等。
基金资助:
Tian WANG1(),Guangxue ZHANG1,Shaobin CAI1,Weijia JIA2,3,Guojun WANG4
Revised:
2018-03-15
Online:
2018-06-01
Published:
2018-07-09
Supported by:
摘要:
传感云系统逐渐发展为一个研究热点。好的信任评价机制能够解决这种新结构中存在的内部攻击等一些安全问题,并且能更好地保障该结构中信息的安全、高效传输。通过对传感云和信任评价机制进行广泛的调研,归纳出传感云的信任评价机制可分为实体间和实体内2类,对比现有信任评价机制的优点与不足,设计了基于雾计算模式的新型信任评价模型,探讨了未来的研究方向。
中图分类号:
王田,张广学,蔡绍滨,贾维嘉,王国军. 传感云中的信任评价机制研究进展[J]. 通信学报, 2018, 39(6): 37-51.
Tian WANG,Guangxue ZHANG,Shaobin CAI,Weijia JIA,Guojun WANG. Survey on trust evaluation mechanism in sensor-cloud[J]. Journal on Communications, 2018, 39(6): 37-51.
表1
实体间的信任评价机制分类"
信任分类 | 说明 | 特征 | 优点 | 缺点 |
基于政策信任 | 对一些参数进行监测,并通过约定的规则进行信任计算 | SLA/PLA、监控、审计、QoS | 完整性高、安全性高 | 灵活性低、速度慢 |
基于推荐信任 | 综合多个服务使用者对服务提供者的认知,建立对服务提供者的信任 | 直接推荐、传递推荐 | 速度快、灵活性高 | 安全性低、完整性低 |
基于声誉信任 | 声誉是服务使用者对服务提供者长期行为的一个评价,将声誉用于服务提供者信任值的计算 | 推荐、信任反馈、声誉积聚 | 速度较快、灵活性较高 | 安全性一般、完整性一般 |
基于预测信任 | 服务使用者与陌生服务提供者之间信任关系的建立是基于预测信任的 | 相似实体、信任决策、信任预测 | 速度快、灵活性高 | 安全性一般、完整性低 |
表5
雾层SNSP的信息记录"
大雾层 | SNSP服务记录 | SNSP需求服务种类 | 交往过的CSP | 交往过的SNSP | 突变风险 | 入驻时间/月 | |
SNSP1 | 1异常8正常 | 可靠性、安全性 | CSP1/CSP2/CSP3 | SNSP1/SNSP2/SNSP3/SNSP4 | 0.1 | 10 | |
SNSP2 | 0异常8正常 | 可靠性、安全性、带宽 | CSP2/CSP3 | SNSP1/SNSP3/SNSP5 | 0.5 | 8 | |
SNSP3 | 0异常10正常 | 可靠性、安全性、兼容性 | CSP1/CSP4/CSP5 | SNSP1/SNSP2/SNSP3/SNSP4/SNSP5 | 0.1 | 15 | |
SNSP4 | 1异常1正常 | 可靠性、安全性、高性能 | CSP2 | SNSP1/SNSP2/SNSP4/SNSP5 | 0.2 | 4 | |
SNSP5 | 0异常1正常 | 可靠性、安全性、平台资源 | CSP1 | SNSP3/SNSP4/SNSP5 | 0.1 | 1 |
[23] | HU Y , WU Y , WANG H . Detection of insider selective forwarding attack based on monitor node and trust mechanism in WSN[J]. Wireless Sensor Network, 2014,06(11): 237-248. |
[24] | AHMED A , BAKAR K A , CHANNA M I ,et al. A trust aware routing protocol for energy constrained wireless sensor network[J]. Telecommunication Systems, 2016,61(1): 123-140. |
[25] | XIANG M , LIU W , BAI Q ,et al. The double-edged sword:revealing the critical role of structural hole in forming trust for securing Wireless sensor networks[C]// 2015 International Telecommunication Networks and Applications Conference (ITNAC). 2015: 286-291. |
[26] | 王国军, 王田, 贾维嘉 . 无线传感器网络中一种基于行进启发的地理位置路由[J]. 传感技术学报, 2007,20(2): 382-386. |
WANG G J , WANG T , JIA W J . March inspired geographic routing protocol in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2007,20(2): 382-386. | |
[27] | AHMED A , BAKAR K A , CHANNA M I ,et al. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks[J]. Frontiers of Computer Science, 2015,9(2): 280-296. |
[28] | MACHHI S , JETHAVA G B . Feedback based trust management for cloud environment[C]// International Conference on Information and Communication Technology for Competitive Strategies. 2016:114. |
[29] | YAN Z , ZHANG P , VASILAKOS A V . A survey on trust management for Internet of things[J]. Journal of Network & Computer Applications, 2014,42(3): 120-134. |
[30] | ISHMANOV F , MALIK A S , KIM S W ,et al. Trust management system in wireless sensor networks:design considerations and research challenges[J]. Transactions on Emerging Telecommunications Technologies, 2015,26(2): 107-130. |
[31] | MANUEL P . A trust model of cloud computing based on quality of Service[J]. Annals of Operations Research, 2015,233(1): 281-292. |
[32] | GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile adhoc networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2012,14(2): 279-298. |
[1] | CHATTERJEE S , LADIA R , MISRA S . Dynamic optimal pricing for heterogeneous service-oriented architecture of sensor-cloud infrastructure[J]. IEEE Transactions on Services Computing, 2017,10(2): 203-216. |
[2] | MISRA S , CHATTERJEE S , OBAIDAT M S . On theoretical modeling of sensor cloud:a paradigm shift from wireless sensor network[J]. IEEE Systems Journal, 2017,11(2): 1084-1093. |
[33] | WU J , CHEN L , YU Q ,et al. Trust-aware media recommendation in heterogeneous social networks[J]. World Wide Web, 2015,18(1): 139-157. |
[34] | WANG T , LI Y , CHEN Y ,et al. Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J]. IEEE Communications Letters, 2017,21(11): 2532-2535. |
[3] | 曾建电, 王田, 贾维嘉 ,等. 传感云研究综述[J]. 计算机研究与发展, 2017,54(5): 925-939. |
ZENG J D , WANG T , JIA W J ,et al. A survey on sensor-cloud[J]. Journal of Computer Research and Development, 2017,54(5): 925-939. | |
[4] | MADRIA S K , . Sensor cloud:a cloud of sensor networks[C]// 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 2017: 2660-2661. |
[5] | ALAMRI A , ANSARI W S , HASSAN M M ,et al. A survey on sensor-cloud:architecture,applications,and approaches[J]. International Journal of Distributed Sensor Networks, 2013(6):18. |
[6] | RASHID B , REHMANI M H . Applications of wireless sensor networks for urban areas:a survey[J]. Journal of Network and Computer Applications, 2016,60: 192-219. |
[7] | RAWAT P , SINGH K D , CHAOUCHI H ,et al. Wireless sensor networks:a survey on recent developments and potential synergies[J]. The Journal of Supercomputing, 2014,68(1): 1-48. |
[8] | RITTINGHOUSE J W , RANSOME J F . Cloud computing:implementation,management,and security[M]. CRC Press, 2016. |
[9] | COUTINHO E F , SOUSA F R D C , REGO P A L ,et al. Elasticity in cloud computing:a survey[J]. Annals of Telecommunications Annales Des Télécommunications, 2015,70(7-8): 289-309. |
[35] | NOOR T H , SHENG Q Z , ZEADALLY S ,et al. Trust management of services in cloud environments:obstacles and solutions[J]. ACM Computing Surveys, 2013,46(1): 1-30. |
[36] | SIDHU J , SINGH S . Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers[J]. Journal of Grid Computing, 2016: 1-25. |
[10] | YURIYAMA M , KUSHIDA T . Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing[C]// International Conference on Network-Based Information Systems. 2010: 1-8. |
[11] | BOSE S , GUPTA A , ADHIKARY S ,et al. Towards a sensor-cloud infrastructure with sensor virtualization[C]// IEEE International Conference on Cyber Security and Cloud Computing. 2015: 25-30. |
[37] | PEARSON S , . Privacy,security and trust in cloud computing[M]// Privacy and Security for Cloud Computing. Springer London, 2013: 3-42. |
[38] | ZHU C , NICANFAR H , LEUNG V C M ,et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration[J]. IEEE Transactions on Information Forensics & Security, 2014,10(1): 118-131. |
[12] | HUH E N , ABAWAJY J . Emerging sensor-cloud technology for pervasive services and applications[J]. International Journal of Distributed Sensor Networks, 2016,2014(1): 1-3. |
[13] | MEHVAR R , ZHANG X . Optimal gateway selection in sensor-cloud framework for health monitoring[J]. IET Wireless Sensor Systems, 2013,4(2): 61-68. |
[39] | MANUEL P . A trust model of cloud computing based on quality of service[J]. Annals of Operations Research, 2015,233(1): 281-292. |
[40] | WANG S , SUN L , SUN Q ,et al. Reputation measurement of cloud services based on unstable feedback ratings[J]. International Journal of Web & Grid Services, 2015,11(4): 362-376. |
[14] | CHATTERJEE S , MISRA S . Target tracking using sensor-cloud:Sensor-target mapping in presence of overlapping coverage[J]. IEEE Communications Letters, 2014,18(8): 1435-1438. |
[15] | MISRA S , SINGH A , CHATTERJEE S ,et al. Mils-cloud:a sensor-cloud-based architecture for the integration of military tri-services operations and decision making[J]. IEEE Systems Journal, 2016,10(2): 628-636. |
[41] | MAO C , LIN R , XU C ,et al. Towards a trust prediction framework for cloud services based on PSO-driven neural network[J]. IEEE Access, 2017,5: 2187-2199. |
[42] | LIN G , WANG D , BIE Y ,et al. MTBAC:a mutual trust based access control model in cloud computing[J]. China Communications, 2014,11(4): 154-162. |
[16] | BHUIYAN M Z A , WANG G , WU J ,et al. Dependable structural health monitoring using wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(4): 363-376. |
[17] | TSO R , ALELAIWI A , RAHMAN S M M ,et al. Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud[J]. Journal of Signal Processing Systems, 2016: 1-9. |
[43] | HOSSEINI S B , SHOJAEE A , AGHELI N . A new method for evaluating cloud computing user behavior trust[C]// Information and Knowledge Technology. 2015: 1-6. |
[44] | LIU Z , PENG D . User behavior identification for trust management in pervasive computing systems[C]// IEEE International Workshop on Future Trends of Distributed Computing Systems. 2007: 65-72. |
[18] | LIU J , SHEN S , YUE G ,et al. A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud[J]. Applied Soft Computing Journal, 2015,30(C): 123-135. |
[19] | SEN A , MADRIA S . A risk assessment framework for wireless sensor networks in a sensor cloud[C]// 2015 16th IEEE International Conference on Mobile Data Management (MDM). 2015: 38-41. |
[45] | JING X , LIU Z , LI S ,et al. A cloud-user behavior assessment based dynamic access control model[J]. International Journal of System Assurance Engineering & Management, 2015: 1-10. |
[46] | SAVAS O , JIN G , DENG J . Trust management in cloud-integrated wireless sensor networks[C]// International Conference on Collaboration Technologies and Systems. 2013: 334-341. |
[20] | GRANJAL J , MONTEIRO E , SILVA J S . Security in the integration of low-power wireless sensor networks with the internet:a survey[J]. Ad Hoc Networks, 2015,24: 264-287. |
[21] | JIANG J , HAN G , ZHU C ,et al. A trust cloud model for underwater wireless sensor networks[J]. IEEE Communications Magazine, 2017,55(3): 110-116. |
[47] | QIN D , YANG S , JIA S ,et al. Research on trust sensing based secure routing mechanism for wireless sensor network[J]. IEEE Access, 2017 |
[48] | JIANG J , HAN G , WANG F ,et al. An efficient distributed trust model for wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(5): 1228-1237. |
[49] | DUAN J , GAO D , YANG D ,et al. An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications[J]. IEEE Internet of Things Journal, 2014,1(1): 58-69. |
[50] | FANG W , ZHANG W , YANG Y ,et al. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution[J]. Science China, 2017,60(4):040305. |
[51] | LIU Y , DONG M , OTA K ,et al. ActiveTrust:secure and trustable routing in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2016,11(9): 2013-2027. |
[52] | LI X , ZHOU F , DU J . LDTS:a lightweight and dependable trust system for clustered wireless sensor networks[J]. IEEE Transactions on Information Forensics & Security, 2013,8(6): 924-935. |
[53] | LABRAOUI N , GUEROUI M , SEKHRI L . A risk-aware reputation-based trust management in wireless sensor networks[J]. Wireless Personal Communications, 2016,87(3): 1037-1055. |
[54] | REDDY V B , VENKATARAMAN S , NEGI A . Communication and data trust for wireless sensor networks using D-S theory[J]. IEEE Sensors Journal, 2017,17(12): 3921-3929. |
[55] | CHATURVEDI P , DANIEL A K . Trust based node scheduling protocol for target coverage in wireless sensor networks[M]// Emerging Research in Computing,Information,Communication and Applications. 2015: 197-205. |
[56] | CHEN Z , HE M , LIANG W ,et al. Trust-aware and low energy consumption security topology protocol of wireless sensor network[J]. Journal of Sensors, 2015,2015(1): 1-10. |
[57] | AHMED A , BAKAR K A , CHANNA M I ,et al. Energy-aware and secure routing with trust for disaster response wireless sensor network[J]. Peer-to-Peer Networking and Applications, 2017,10(1): 216-237. |
[58] | GUO J , CHEN I R , TSAI J J P . A survey of trust computation models for service management in internet of things systems[J]. Computer Communications, 2016,97: 1-14. |
[59] | ANITA X , BHAGYAVENI M A , MANICKAM J M . Fuzzy-based trust prediction model for routing in WSN[J]. The Scientific World Journal, 2014,2014(2): 1-11. |
[60] | PRABHA V R , LATHA P . Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks[J]. Sādhanā, 2017: 1-9. |
[61] | MARZI H , LI M . An enhanced bio-inspired trust and reputation model for wireless sensor network[J]. Procedia Computer Science, 2013,19: 1159-1166. |
[62] | FENG R , CHE S , WANG X ,et al. Trust management scheme based on D-S evidence theory for wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013,2013(4): 130-142. |
[63] | GUPTA G P , MISRA M , GARG K . Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks[J]. Journal of Network & Computer Applications, 2014,41(1): 300-311. |
[64] | CHAE Y , DIPIPPO L C , SUN Y L . Trust management for defending on-off attacks[J]. IEEE Transactions on Parallel and Distributed Systems, 2015,26(4): 1178-1191. |
[65] | SHEN S , HUANG L , FAN E ,et al. Trust dynamics in WSN:an evolutionary game-theoretic approach[J]. Journal of Sensors, 2016,2016: 1-10. |
[66] | FANG W , ZHANG C , SHI Z ,et al. BTRES:Beta-based trust and reputation evaluation system for wireless sensor networks[J]. Journal of Network & Computer Applications, 2016,59: 88-94. |
[67] | REN Y , ZADOROZHNY V I , OLESHCHUK V A ,et al. A novel approach to trust management in unattended wireless sensor networks[J]. IEEE Transactions on Mobile Computing, 2014,13(7): 1409-1423. |
[68] | BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the internet of things[C]// Edition of the Mcc Workshop on Mobile Cloud Computing. 2012: 13-16. |
[69] | WANG T , PENG Z , WEN S ,et al. Reliable wireless connections for fast-moving rail users based on a chained fog structure[J]. Information Sciences, 2017,379: 160-176. |
[70] | WANG T , ZENG J , BHUIYAN M Z A ,et al. Trajectory privacy preservation based on a fog structure for Cloud location services[J]. IEEE Access, 2017,5: 7692-7701. |
[71] | VAQUERO L M , RODERO M L . Finding your way in the fog:towards a comprehensive definition of fog computing[J]. ACM SIGCOMM Computer Communication Review, 2014,44(5): 27-32. |
[72] | BAO F , CHEN R , CHANG M J ,et al. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J]. IEEE transactions on network and service management, 2012,9(2): 169-183. |
[73] | HONG K , LILLETHUN D , RAMACHANDRAN U ,et al. Mobile fog:a programming model for large-scale applications on the internet of things[C]// ACM SIGCOMM Workshop on Mobile Cloud Computing. 2013: 15-20. |
[74] | BONOMI F , MILITO R , NATARAJAN P ,et al. Fog computing:a platform for internet of things and analytics[M]// Big Data and Internet of Things:A Roadmap for Smart Environments. Springer International Publishing, 2014: 169-186. |
[22] | HAN G , JIANG J , SHU L ,et al. Management and applications of trust in wireless sensor networks:a survey[J]. Journal of Computer & System Sciences, 2014,80(3): 602-617. |
[1] | 董江涛, 闫沛文, 杜瑞忠. 雾计算中基于无配对CP-ABE可验证的访问控制方案[J]. 通信学报, 2021, 42(8): 139-150. |
[2] | 杜瑞忠, 闫沛文, 刘妍. 雾计算中细粒度属性更新的外包计算访问控制方案[J]. 通信学报, 2021, 42(3): 160-170. |
[3] | 王田,沈雪微,罗皓,陈柏生,王国军,贾维嘉. 基于雾计算的可信传感云研究进展[J]. 通信学报, 2019, 40(3): 170-181. |
[4] | 贾维嘉,周小杰. 雾计算的概念、相关研究与应用[J]. 通信学报, 2018, 39(5): 153-165. |
[5] | 王田,李洋,贾维嘉,王国军,彭绍亮. 传感云安全研究进展[J]. 通信学报, 2018, 39(3): 35-52. |
[6] | 毛郁欣. 基于计数器对称加密的无线传感器网络入侵检测算法[J]. 通信学报, 2011, 32(9A): 211-219. |
[7] | 崔国华,卢社阶,刘志远,耿永军. Ad hoc网络中基于多径路由协议的信誉机制[J]. 通信学报, 2008, 29(5): 56-64. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|