通信学报 ›› 2018, Vol. 39 ›› Issue (3): 35-52.doi: 10.11959/j.issn.1000-436x.2018035
修回日期:
2017-12-02
出版日期:
2018-03-01
发布日期:
2018-04-02
作者简介:
王田(1982-),男,湖南汨罗人,博士,华侨大学教授,主要研究方向为物联网及其安全问题、云计算技术、社交网络、软件安全、大数据处理等。|李洋(1991-),女,湖北黄石人,华侨大学硕士生,主要研究方向为传感云安全、雾计算、物联网等。|贾维嘉(1957-),男,中国香港人,博士,上海交通大学教授、博士生导师,主要研究方向为下一代无线通信、协议、异构网络等。|王国军(1970-),男,湖南长沙人,博士,广州大学教授、博士生导师,主要研究方向为网络和信息安全、物联网和云计算等。|彭绍亮(1979-),男,湖南长沙人,博士,国防科技大学教授,主要研究方向为分布式系统、计算机性能和无线网络等。
基金资助:
Tian WANG1(),Yang LI1,Weijia JIA2,3,Guojun WANG4,Shaoliang PENG5
Revised:
2017-12-02
Online:
2018-03-01
Published:
2018-04-02
Supported by:
摘要:
通过调研大量的国内外传感云安全的相关文献发现,现有的传感云系统存在一系列严重的安全问题,如不同服务提供商的信誉问题、物理节点耦合漏洞、数据权限管理漏洞等,严重地阻碍了传感云系统的进一步发展。分析了传感云系统存在的安全问题,对比了现有的传感云安全技术,讨论总结了不同种类解决方案的优缺点,提出了未来传感云发展面临的安全挑战。最后,设计了基于雾计算框架下传感云安全的实现方案,为传感云的安全研究带来新的思路。
中图分类号:
王田,李洋,贾维嘉,王国军,彭绍亮. 传感云安全研究进展[J]. 通信学报, 2018, 39(3): 35-52.
Tian WANG,Yang LI,Weijia JIA,Guojun WANG,Shaoliang PENG. Research progress of sensor-cloud security[J]. Journal on Communications, 2018, 39(3): 35-52.
[32] | BUTUN I , MORGERA S D , SANKAR R . A survey of intrusion detection systems in wireless sensor networks[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 266-282. |
[33] | ALRAJEH N A , KHAN S , SHAMS B . Intrusion detection systems in wireless sensor networks:a review[J]. International Journal of Distributed Sensor Networks, 2013,9(5):167575. |
[34] | SMIRNOV A V , BORISENKO K A , SHOROV A V ,et al. Network traffic processing module for infrastructure attacks detection in cloud computing platforms[C]// 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM). 2016: 199-202. |
[35] | PATEL A , TAGHAVI M , BAKHTIYARI K ,et al. An intrusion detection and prevention system in cloud computing:a systematic review[J]. Journal of Network and Computer Applications, 2013,36(1): 25-41. |
[36] | SINHA N , PUJITHA K E , ALEX J S R . Xively based sensing and monitoring system for IoT[C]// International Conference on Computer Communication and Informatics (ICCCI). 2015: 1-6. |
[37] | RAY P P . A survey of IoT cloud platforms[J]. Future Computing and Informatics Journal, 2016,1(1-2): 35-46. |
[38] | SUHAIL S , HONG C S , AHMAD Z U ,et al. Introducing secure provenance in IoT:requirements and challenges[C]// International Workshop on Secure Internet of Things (SIoT). 2016: 39-46. |
[39] | DOUKAS C , MAGLOGIANNIS I . Bringing IoT and cloud computing towards pervasive healthcare[C]// Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). 2012: 922-926. |
[1] | 林闯, 苏文博, 孟坤 ,等. 云计算安全:架构,机制与模型评价[J]. 计算机学报, 2013,36(9): 1765-1784. |
LIN C , SU W B , MENG K ,et al. Cloud computing security:infrastructure,mechanism and model evaluation[J]. Chinese Journal of Computers, 2013,36(9): 1765-1784. | |
[40] | PASHA S . ThingSpeak based sensing and monitoring system for IoT with Matlab Analysis[J]. International Journal of New Technology and Research (IJNTR), 2016,2(6): 19-23. |
[41] | LOUNIS A , HADJIDJ A , BOUABDALLAH A ,et al. Secure and scalable cloud-based architecture for e-health wireless sensor networks[C]// 21st International Conference on Computer Communications and Networks (ICCCN). 2012: 1-7. |
[2] | 王国军, 王田, 贾维嘉 . 无线传感器网络中一种基于行进启发的地理位置路由[J]. 传感技术学报, 2007,20(2): 382-386. |
WANG G J , WANG T , JIA W J . A travel-based position route in wireless sensor networks[J]. Journal of Sensor Technology, 2007,20(2): 382-286. | |
[42] | BAEK J , VU Q H , LIU J K ,et al. A secure cloud computing based framework for big data information management of smart grid[J]. IEEE Transactions on Cloud Computing, 2015,3(2): 233-244. |
[43] | BUTUN I , EROL-KANTARCI M , KANTARCI B ,et al. Cloud-centric multi-level authentication as a service for secure public safety device networks[J]. IEEE Communications Magazine, 2016,54(4): 47-53. |
[3] | WANG T , PENG Z , LIANG J B ,et al. Following targets for mobile tracking in wireless sensor networks[J]. ACM Transactions on Sensor Networks, 2016,12(4): 1-24. |
[4] | 张希伟, 戴海鹏, 徐力杰 ,等. 无线传感器网络中移动协助的数据收集策略[J]. 软件学报, 2013,24(2): 198-214. |
[44] | BUTUN I , WANG Y , LEE Y ,et al. Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks[J]. International Journal of Security and Networks, 2012,7(2): 107-121. |
[45] | BANAIE F , SENO S A H . A cloud-based architecture for secure and reliable service provisioning in wireless sensor network[C]// 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE). 2014: 96-101. |
[4] | ZHANG X W , DAI H P , XU L J ,et al. Mobility assisted data collection strategy in wireless sensor network[J]. Journal of Software, 2013,24(2): 198-214. |
[5] | 俞姝颖, 吴小兵, 陈贵海 ,等. 无线传感器网络在桥梁健康监测中的应用[J]. 软件学报, 2015,26(6): 1486-1498. |
[46] | GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile ad hoc networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2012,14(2): 279-298. |
[47] | JIANG J , HAN G , WANG F ,et al. An efficient distributed trust model for wireless sensor networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,26(5):1. |
[5] | YU S Y , WU X B , CHEN G H ,et al. Application of wireless sensor networks in bridge health monitoring[J]. Journal of Software, 2015,26(6): 1486-1498. |
[6] | DASH S K , SAHOO J P , MOHAPATRA S ,et al. Sensor-cloud:assimilation of wireless sensor network and the cloud[C]// International Conference on Computer Science and Information Technology. 2012: 455-464. |
[48] | SAHA S , DAS R , DATTA S ,et al. A cloud security framework for a data centric WSN application[C]// The 17th International Conference on Distributed Computing and Networking. 2016:39. |
[49] | LOUNIS A , HADJIDJ A , BOUABDALLAH A ,et al. Healing on the cloud:secure cloud architecture for medical wireless sensor networks[J]. Future Generation Computer Systems, 2016,55: 266-277. |
[7] | 刘正伟, 文中领, 张海涛 . 云计算和云数据管理技术[J]. 计算机研究与发展, 2012,49(1): 26-31. |
LIU Z W , WEN Z L , ZHANG H T . Cloud computing and cloud data management technology[J]. Computer Research and Development, 2012,49(1): 26-31. | |
[50] | ALBUQUERQUE S L , GONDIM P R L . Security in cloud-computingbased mobile health[J]. IT Professional, 2016,18(3): 37-44. |
[51] | SHAH S H , KHAN F K , ALI W ,et al. A new framework to integrate wireless sensor networks with cloud computing[C]// Aerospace Conference. 2013: 1-6. |
[8] | WANG T,LI Y , WANG G J , CAO J N ,et al. Sustainable and efficient data collection from WSNs to cloud[J]. IEEE Transactions on Sustainable Computing, 2017,PP(99): 1-12. |
[9] | 曾建电, 王田, 贾维嘉 ,等. 传感云研究综述[J]. 计算机研究与发展, 2017,54(5): 925-939. |
[52] | ZHU C , WANG H , LIU X ,et al. A novel sensory data processing framework to integrate sensor networks with mobile cloud[J]. IEEE Systems Journal, 2016,10(3): 1125-1136. |
[53] | PONMAGAL R S , DINESH N , RAJARAM U . Design and development of secure cloud architecture for sensor services[C]// International Conference on Distributed Computing and Internet Technology. 2015: 339-344. |
[9] | ZENG J D , WANG T , JIA W J ,et al. Survey of sensor cloud[J]. Computer Research and Development, 2017,54(5): 925-939. |
[10] | MISRA S , BERA S , MONDAL A ,et al. Optimal gateway selection in sensor-cloud framework for health monitoring[J]. IET Wireless Sensor Systems, 2014,4(2): 61-68. |
[54] | GUAN Z , YANG T , DU X ,et al. Secure data access for wireless body sensor networks[C]// Wireless Communications and Networking Conference (WCNC). 2016: 1-6. |
[55] | HENZE M , HUMMEN R , MATZUTT R ,et al. The sensorcloud protocol:securely outsourcing sensor data to the cloud[J]. arXiv preprint arXiv:1607.03239, 2016. |
[11] | GERLA M , LEE E K , PAU G ,et al. Internet of vehicles:from intelligent grid to autonomous cars and vehicular clouds[C]// 2014 IEEE World Forum on Internet of Things (WF-IoT). 2014: 241-246. |
[12] | SIMMHAN Y , AMAN S , KUMBHARE A ,et al. Cloud-based software platform for big data analytics in smart grids[J]. Computing in Science & Engineering, 2013,15(4): 38-47. |
[56] | GRANJAL J , MONTEIRO E , SILVA J S . Security in the integration of low-power wireless sensor networks with the internet:a survey[J]. Ad Hoc Networks, 2015,24: 264-287. |
[57] | YUEN T H , ZHANG Y , YIU S M ,et al. Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks[C]// European Symposium on Research in Computer Security. 2014: 130-147. |
[13] | YURIYAMA M , KUSHIDA T . Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing[C]// 13th International Conference on Network-Based Information Systems (NBiS). 2010: 1-8. |
[14] | GE Y , ZHANG X , HAN B . Complex IoT control system modeling from perspectives of environment perception and information security[J]. Mobile Networks & Applications, 2017,22(3): 1-9. |
[58] | MISRA S , SINGH A , CHATTERJEE S ,et al. Mils-cloud:a sensor-cloud-based architecture for the integration of military tri-services operations and decision making[J]. IEEE Systems Journal, 2016,10(2): 628-636. |
[59] | ZHU C , NICANFAR H , LEUNG V C M ,et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration[J]. IEEE Transactions on Information Forensics & Security, 2015,10(1): 118-131. |
[15] | DIPIETRO R , GUARINO S , VERDE N V ,et al. Security in wireless ad hoc networks-a survey[J]. Computer Communications, 2014,51: 1-20. |
[16] | WANG T , PENG Z , WEN S ,et al. Reliable wireless connections for fast-moving rail users based on a chained fog structure[J]. Information Sciences, 2017,379: 160-176. |
[60] | WHITEHEAD J R . Cluster-based trust proliferation and energy efficient data collection in unattended wireless sensor networks with mobile sinks[D]. Chattanooga:University of Tennessee, 2016. |
[61] | LUCA G D , CHEN Y . Visual IoT robotics programming language in pi-calculus[C]// International Symposium on Autonomous Decentralized System. 2017: 23-30. |
[17] | WANG T , LI Y , WANG G J ,et al. Sustainable and efficient data collection from WSN to cloud[J]. IEEE Transactions on Sustainable Computing, 2017,PP(99): 1-12. |
[18] | CHEN M , MA Y , LI Y ,et al. Wearable 2.0:enabling human-cloud integration in next generation healthcare systems[J]. IEEE Communications Magazine, 2017,55(1): 54-61. |
[62] | LOMOTEY R K , PRY J C , CHAI C . Traceability and visual analytics for the Internet-of-Things (IoT) architecture[J]. World Wide Web-internet& Web Information Systems, 2017(4): 1-26. |
[63] | GARGEES R , MORAGO B , PELAPUR R ,et al. Incident-supporting visual cloud computing utilizing software-defined networking[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017,27(1): 182-197. |
[19] | MAN H A , YUEN T H , LIU J K ,et al. A general framework for secure sharing of personal health records in cloud system[J]. Journal of Computer & System Sciences, 2017. |
[20] | CAI H , XU B , JIANG L ,et al. IoT-based big data storage systems in cloud computing:Perspectives and challenges[J]. IEEE Internet of Things Journal, 2017,4(1): 75-87. |
[64] | ZHOU R , LAI Y , LIU Z ,et al. A security authentication protocol for trusted domains in an autonomous decentralized system[J]. International Journal of Distributed Sensor Networks, 2016,12(3):5327949. |
[65] | YOON K , PARK D , YIM Y ,et al. Security authentication system using encrypted channel on UAV network[C]// IEEE International Conference on Robotic Computing (IRC). 2017: 393-398. |
[21] | LIU J , SHEN S , YUE G ,et al. A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud[J]. Applied Soft Computing, 2015,30(C): 123-135. |
[22] | GARGEES R , MORAGO B , PELAPUR R ,et al. Incident-supporting visual cloud computing utilizing software-defined networking[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017,27(1): 182-197. |
[66] | ZHANG Y , LYU M R . QoS-aware byzantine fault tolerance[M]. QoS Prediction in Cloud and Service Computing. Singapore: SpringorPress, 2017: 105-120. |
[67] | BHAT A , SAMII S , RAJKUMAR R . Practical task allocation for software fault-tolerance and its implementation in embedded automotive systems[C]// Real-Time and Embedded Technology and Applications Symposium (RTAS). 2017: 87-98. |
[23] | WANG T , LI Y , CHEN Y ,et al. Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J]. IEEE Communications Letters, 2017,21(11): 2532-2535. |
[24] | WINKLER T , RINNER B . Security and privacy protection in visual sensor networks:a survey[J]. ACM Computing Surveys (CSUR), 2014,47(1):2. |
[68] | ZHANG T , YAN L , YANG Y . Trust evaluation method for clustered wireless sensor networks based on cloud model[J]. Wireless Networks, 2016: 1-21. |
[69] | SUN D , ZHAO H , CHENG S . A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS[J]. Security and Communication Networks, 2016,9(18): 5710-5723. |
[25] | HE D , KUMAR N . A secure temporal credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks[J]. Information Sciences, 2015,321: 263-277. |
[26] | SAJID A , ABBAS H , SALEEM K . Cloud-assisted IoT-based SCADA systems security:a review of the state of the art and future challenges[J]. IEEE Access, 2016,4: 1375-1384. |
[70] | LI X , HE J , ZHAO B ,et al. A method for trust quantification in cloud computing environments[J]. International Journal of Distributed Sensor Networks, 2016,12(2):5052614. |
[71] | BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the Internet of things[C]// Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. 2012: 13-16. |
[27] | MARTIN K , WANG W . Aya:an efficient access-controlled storage and processing for cloud-based sensed data[C]// 12th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). 2015: 130-134. |
[28] | SAHA S , . Secure sensor data management model in a sensor-cloud integration environment[C]// Applications and Innovations in Mobile Computing (AIMoC). 2015: 158-163. |
[72] | TIAN W , ZHOU J Y , WANG G J ,et al. Three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing[J]. IEEEE Transactions on Emerging Topics in Computational Intelligence, 2018,2(1): 3-12. |
[73] | GARCIA LOPEZ P , MONTRESOR A , EPEMA D ,et al. Edge-centric computing:vision and challenges[J]. ACM SIGCOMM Computer Communication Review, 2015,45(5): 37-42. |
[29] | ZHOU J , CAO Z , DONG X ,et al. Security and privacy in cloud-assisted wireless wearable communications:challenges,solutions,and future directions[J]. IEEE Wireless Communications, 2015,22(2): 136-144. |
[30] | HENZE M , HERMERSCHMIDT L , KERPEN D ,et al. A comprehensive approach to privacy in the cloud-based internet of things[J]. Future Generation Computer Systems, 2016,56: 701-718. |
[31] | BRUNEO D , DISTEFANO S , LONGO F ,et al. IoT-cloud authorization and delegation mechanisms for ubiquitous sensing and actuation[C]// 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 2016: 222-227. |
[1] | 赵仕祺, 黄小红, 钟志港. 基于信誉的域间路由选择机制的研究与实现[J]. 通信学报, 2023, 44(6): 47-56. |
[2] | 马玲, 樊漆亮, 许婷, 郭冠琛, 张圣林, 孙永谦, 张玉志. 基于强化学习的在线离线混部云环境下的调度框架[J]. 通信学报, 2023, 44(6): 90-102. |
[3] | 刘盈泽, 郭渊博, 方晨, 李勇飞, 陈庆礼. 基于有限理性的网络防御策略智能规划方法[J]. 通信学报, 2023, 44(5): 52-63. |
[4] | 李元诚, 秦永泰. 基于深度强化学习的软件定义安全中台QoS实时优化算法[J]. 通信学报, 2023, 44(5): 181-192. |
[5] | 谢人超, 文雯, 唐琴琴, 刘云龙, 谢高畅, 黄韬. 轨道交通移动边缘计算网络安全综述[J]. 通信学报, 2023, 44(4): 201-215. |
[6] | 罗智勇, 张玉, 王青, 宋伟伟. 基于贝叶斯攻击图的SDN入侵意图识别算法的研究[J]. 通信学报, 2023, 44(4): 216-225. |
[7] | 余雪勇, 邱礼翔, 宋家宁, 朱洪波. 无人机辅助边缘计算中安全通信与能效优化策略[J]. 通信学报, 2023, 44(3): 45-54. |
[8] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[9] | 张艳硕, 刘宁, 袁煜淇, 杨亚涛. 基于ISRSAC数字签名算法的适配器签名方案[J]. 通信学报, 2023, 44(3): 178-185. |
[10] | 康海燕, 龙墨澜. 基于吸收马尔可夫链攻击图的网络攻击分析方法研究[J]. 通信学报, 2023, 44(2): 122-135. |
[11] | 刘彩霞, 季新生, 邬江兴. 移动通信网的内生安全共性问题及破解之道[J]. 通信学报, 2022, 43(9): 70-79. |
[12] | 石润华, 于辉, 柯唯阳, 徐小桐. 基于BB84态的量子匿名一票否决协议[J]. 通信学报, 2022, 43(8): 109-120. |
[13] | 陈炜宇, 骆俊杉, 王方刚, 丁海洋, 王世练, 夏国江. 无线隐蔽通信容量限与实现技术综述[J]. 通信学报, 2022, 43(8): 203-218. |
[14] | 郭渊博, 李勇飞, 陈庆礼, 方晨, 胡阳阳. 融合Focal Loss的网络威胁情报实体抽取[J]. 通信学报, 2022, 43(7): 85-92. |
[15] | 杜瑞忠, 张玉晴, 李明月. 基于双向索引的高效连接关键字查询动态可搜索加密方案[J]. 通信学报, 2022, 43(5): 123-132. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|