Journal on Communications ›› 2018, Vol. 39 ›› Issue (3): 35-52.doi: 10.11959/j.issn.1000-436x.2018035
• Special Issue on Internet of Things and Its Security • Previous Articles Next Articles
Tian WANG1(),Yang LI1,Weijia JIA2,3,Guojun WANG4,Shaoliang PENG5
Revised:
2017-12-02
Online:
2018-03-01
Published:
2018-04-02
Supported by:
CLC Number:
Tian WANG,Yang LI,Weijia JIA,Guojun WANG,Shaoliang PENG. Research progress of sensor-cloud security[J]. Journal on Communications, 2018, 39(3): 35-52.
[32] | BUTUN I , MORGERA S D , SANKAR R . A survey of intrusion detection systems in wireless sensor networks[J]. IEEE Communications Surveys & Tutorials, 2014,16(1): 266-282. |
[33] | ALRAJEH N A , KHAN S , SHAMS B . Intrusion detection systems in wireless sensor networks:a review[J]. International Journal of Distributed Sensor Networks, 2013,9(5):167575. |
[34] | SMIRNOV A V , BORISENKO K A , SHOROV A V ,et al. Network traffic processing module for infrastructure attacks detection in cloud computing platforms[C]// 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM). 2016: 199-202. |
[35] | PATEL A , TAGHAVI M , BAKHTIYARI K ,et al. An intrusion detection and prevention system in cloud computing:a systematic review[J]. Journal of Network and Computer Applications, 2013,36(1): 25-41. |
[36] | SINHA N , PUJITHA K E , ALEX J S R . Xively based sensing and monitoring system for IoT[C]// International Conference on Computer Communication and Informatics (ICCCI). 2015: 1-6. |
[37] | RAY P P . A survey of IoT cloud platforms[J]. Future Computing and Informatics Journal, 2016,1(1-2): 35-46. |
[38] | SUHAIL S , HONG C S , AHMAD Z U ,et al. Introducing secure provenance in IoT:requirements and challenges[C]// International Workshop on Secure Internet of Things (SIoT). 2016: 39-46. |
[39] | DOUKAS C , MAGLOGIANNIS I . Bringing IoT and cloud computing towards pervasive healthcare[C]// Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). 2012: 922-926. |
[1] | 林闯, 苏文博, 孟坤 ,等. 云计算安全:架构,机制与模型评价[J]. 计算机学报, 2013,36(9): 1765-1784. |
LIN C , SU W B , MENG K ,et al. Cloud computing security:infrastructure,mechanism and model evaluation[J]. Chinese Journal of Computers, 2013,36(9): 1765-1784. | |
[40] | PASHA S . ThingSpeak based sensing and monitoring system for IoT with Matlab Analysis[J]. International Journal of New Technology and Research (IJNTR), 2016,2(6): 19-23. |
[41] | LOUNIS A , HADJIDJ A , BOUABDALLAH A ,et al. Secure and scalable cloud-based architecture for e-health wireless sensor networks[C]// 21st International Conference on Computer Communications and Networks (ICCCN). 2012: 1-7. |
[2] | 王国军, 王田, 贾维嘉 . 无线传感器网络中一种基于行进启发的地理位置路由[J]. 传感技术学报, 2007,20(2): 382-386. |
WANG G J , WANG T , JIA W J . A travel-based position route in wireless sensor networks[J]. Journal of Sensor Technology, 2007,20(2): 382-286. | |
[42] | BAEK J , VU Q H , LIU J K ,et al. A secure cloud computing based framework for big data information management of smart grid[J]. IEEE Transactions on Cloud Computing, 2015,3(2): 233-244. |
[43] | BUTUN I , EROL-KANTARCI M , KANTARCI B ,et al. Cloud-centric multi-level authentication as a service for secure public safety device networks[J]. IEEE Communications Magazine, 2016,54(4): 47-53. |
[3] | WANG T , PENG Z , LIANG J B ,et al. Following targets for mobile tracking in wireless sensor networks[J]. ACM Transactions on Sensor Networks, 2016,12(4): 1-24. |
[4] | 张希伟, 戴海鹏, 徐力杰 ,等. 无线传感器网络中移动协助的数据收集策略[J]. 软件学报, 2013,24(2): 198-214. |
[44] | BUTUN I , WANG Y , LEE Y ,et al. Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks[J]. International Journal of Security and Networks, 2012,7(2): 107-121. |
[45] | BANAIE F , SENO S A H . A cloud-based architecture for secure and reliable service provisioning in wireless sensor network[C]// 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE). 2014: 96-101. |
[4] | ZHANG X W , DAI H P , XU L J ,et al. Mobility assisted data collection strategy in wireless sensor network[J]. Journal of Software, 2013,24(2): 198-214. |
[5] | 俞姝颖, 吴小兵, 陈贵海 ,等. 无线传感器网络在桥梁健康监测中的应用[J]. 软件学报, 2015,26(6): 1486-1498. |
[46] | GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile ad hoc networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2012,14(2): 279-298. |
[47] | JIANG J , HAN G , WANG F ,et al. An efficient distributed trust model for wireless sensor networks[J]. IEEE Transactions on Parallel & Distributed Systems, 2014,26(5):1. |
[5] | YU S Y , WU X B , CHEN G H ,et al. Application of wireless sensor networks in bridge health monitoring[J]. Journal of Software, 2015,26(6): 1486-1498. |
[6] | DASH S K , SAHOO J P , MOHAPATRA S ,et al. Sensor-cloud:assimilation of wireless sensor network and the cloud[C]// International Conference on Computer Science and Information Technology. 2012: 455-464. |
[48] | SAHA S , DAS R , DATTA S ,et al. A cloud security framework for a data centric WSN application[C]// The 17th International Conference on Distributed Computing and Networking. 2016:39. |
[49] | LOUNIS A , HADJIDJ A , BOUABDALLAH A ,et al. Healing on the cloud:secure cloud architecture for medical wireless sensor networks[J]. Future Generation Computer Systems, 2016,55: 266-277. |
[7] | 刘正伟, 文中领, 张海涛 . 云计算和云数据管理技术[J]. 计算机研究与发展, 2012,49(1): 26-31. |
LIU Z W , WEN Z L , ZHANG H T . Cloud computing and cloud data management technology[J]. Computer Research and Development, 2012,49(1): 26-31. | |
[50] | ALBUQUERQUE S L , GONDIM P R L . Security in cloud-computingbased mobile health[J]. IT Professional, 2016,18(3): 37-44. |
[51] | SHAH S H , KHAN F K , ALI W ,et al. A new framework to integrate wireless sensor networks with cloud computing[C]// Aerospace Conference. 2013: 1-6. |
[8] | WANG T,LI Y , WANG G J , CAO J N ,et al. Sustainable and efficient data collection from WSNs to cloud[J]. IEEE Transactions on Sustainable Computing, 2017,PP(99): 1-12. |
[9] | 曾建电, 王田, 贾维嘉 ,等. 传感云研究综述[J]. 计算机研究与发展, 2017,54(5): 925-939. |
[52] | ZHU C , WANG H , LIU X ,et al. A novel sensory data processing framework to integrate sensor networks with mobile cloud[J]. IEEE Systems Journal, 2016,10(3): 1125-1136. |
[53] | PONMAGAL R S , DINESH N , RAJARAM U . Design and development of secure cloud architecture for sensor services[C]// International Conference on Distributed Computing and Internet Technology. 2015: 339-344. |
[9] | ZENG J D , WANG T , JIA W J ,et al. Survey of sensor cloud[J]. Computer Research and Development, 2017,54(5): 925-939. |
[10] | MISRA S , BERA S , MONDAL A ,et al. Optimal gateway selection in sensor-cloud framework for health monitoring[J]. IET Wireless Sensor Systems, 2014,4(2): 61-68. |
[54] | GUAN Z , YANG T , DU X ,et al. Secure data access for wireless body sensor networks[C]// Wireless Communications and Networking Conference (WCNC). 2016: 1-6. |
[55] | HENZE M , HUMMEN R , MATZUTT R ,et al. The sensorcloud protocol:securely outsourcing sensor data to the cloud[J]. arXiv preprint arXiv:1607.03239, 2016. |
[11] | GERLA M , LEE E K , PAU G ,et al. Internet of vehicles:from intelligent grid to autonomous cars and vehicular clouds[C]// 2014 IEEE World Forum on Internet of Things (WF-IoT). 2014: 241-246. |
[12] | SIMMHAN Y , AMAN S , KUMBHARE A ,et al. Cloud-based software platform for big data analytics in smart grids[J]. Computing in Science & Engineering, 2013,15(4): 38-47. |
[56] | GRANJAL J , MONTEIRO E , SILVA J S . Security in the integration of low-power wireless sensor networks with the internet:a survey[J]. Ad Hoc Networks, 2015,24: 264-287. |
[57] | YUEN T H , ZHANG Y , YIU S M ,et al. Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks[C]// European Symposium on Research in Computer Security. 2014: 130-147. |
[13] | YURIYAMA M , KUSHIDA T . Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing[C]// 13th International Conference on Network-Based Information Systems (NBiS). 2010: 1-8. |
[14] | GE Y , ZHANG X , HAN B . Complex IoT control system modeling from perspectives of environment perception and information security[J]. Mobile Networks & Applications, 2017,22(3): 1-9. |
[58] | MISRA S , SINGH A , CHATTERJEE S ,et al. Mils-cloud:a sensor-cloud-based architecture for the integration of military tri-services operations and decision making[J]. IEEE Systems Journal, 2016,10(2): 628-636. |
[59] | ZHU C , NICANFAR H , LEUNG V C M ,et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration[J]. IEEE Transactions on Information Forensics & Security, 2015,10(1): 118-131. |
[15] | DIPIETRO R , GUARINO S , VERDE N V ,et al. Security in wireless ad hoc networks-a survey[J]. Computer Communications, 2014,51: 1-20. |
[16] | WANG T , PENG Z , WEN S ,et al. Reliable wireless connections for fast-moving rail users based on a chained fog structure[J]. Information Sciences, 2017,379: 160-176. |
[60] | WHITEHEAD J R . Cluster-based trust proliferation and energy efficient data collection in unattended wireless sensor networks with mobile sinks[D]. Chattanooga:University of Tennessee, 2016. |
[61] | LUCA G D , CHEN Y . Visual IoT robotics programming language in pi-calculus[C]// International Symposium on Autonomous Decentralized System. 2017: 23-30. |
[17] | WANG T , LI Y , WANG G J ,et al. Sustainable and efficient data collection from WSN to cloud[J]. IEEE Transactions on Sustainable Computing, 2017,PP(99): 1-12. |
[18] | CHEN M , MA Y , LI Y ,et al. Wearable 2.0:enabling human-cloud integration in next generation healthcare systems[J]. IEEE Communications Magazine, 2017,55(1): 54-61. |
[62] | LOMOTEY R K , PRY J C , CHAI C . Traceability and visual analytics for the Internet-of-Things (IoT) architecture[J]. World Wide Web-internet& Web Information Systems, 2017(4): 1-26. |
[63] | GARGEES R , MORAGO B , PELAPUR R ,et al. Incident-supporting visual cloud computing utilizing software-defined networking[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017,27(1): 182-197. |
[19] | MAN H A , YUEN T H , LIU J K ,et al. A general framework for secure sharing of personal health records in cloud system[J]. Journal of Computer & System Sciences, 2017. |
[20] | CAI H , XU B , JIANG L ,et al. IoT-based big data storage systems in cloud computing:Perspectives and challenges[J]. IEEE Internet of Things Journal, 2017,4(1): 75-87. |
[64] | ZHOU R , LAI Y , LIU Z ,et al. A security authentication protocol for trusted domains in an autonomous decentralized system[J]. International Journal of Distributed Sensor Networks, 2016,12(3):5327949. |
[65] | YOON K , PARK D , YIM Y ,et al. Security authentication system using encrypted channel on UAV network[C]// IEEE International Conference on Robotic Computing (IRC). 2017: 393-398. |
[21] | LIU J , SHEN S , YUE G ,et al. A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud[J]. Applied Soft Computing, 2015,30(C): 123-135. |
[22] | GARGEES R , MORAGO B , PELAPUR R ,et al. Incident-supporting visual cloud computing utilizing software-defined networking[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017,27(1): 182-197. |
[66] | ZHANG Y , LYU M R . QoS-aware byzantine fault tolerance[M]. QoS Prediction in Cloud and Service Computing. Singapore: SpringorPress, 2017: 105-120. |
[67] | BHAT A , SAMII S , RAJKUMAR R . Practical task allocation for software fault-tolerance and its implementation in embedded automotive systems[C]// Real-Time and Embedded Technology and Applications Symposium (RTAS). 2017: 87-98. |
[23] | WANG T , LI Y , CHEN Y ,et al. Fog-based evaluation approach for trustworthy communication in sensor-cloud system[J]. IEEE Communications Letters, 2017,21(11): 2532-2535. |
[24] | WINKLER T , RINNER B . Security and privacy protection in visual sensor networks:a survey[J]. ACM Computing Surveys (CSUR), 2014,47(1):2. |
[68] | ZHANG T , YAN L , YANG Y . Trust evaluation method for clustered wireless sensor networks based on cloud model[J]. Wireless Networks, 2016: 1-21. |
[69] | SUN D , ZHAO H , CHENG S . A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS[J]. Security and Communication Networks, 2016,9(18): 5710-5723. |
[25] | HE D , KUMAR N . A secure temporal credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks[J]. Information Sciences, 2015,321: 263-277. |
[26] | SAJID A , ABBAS H , SALEEM K . Cloud-assisted IoT-based SCADA systems security:a review of the state of the art and future challenges[J]. IEEE Access, 2016,4: 1375-1384. |
[70] | LI X , HE J , ZHAO B ,et al. A method for trust quantification in cloud computing environments[J]. International Journal of Distributed Sensor Networks, 2016,12(2):5052614. |
[71] | BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the Internet of things[C]// Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. 2012: 13-16. |
[27] | MARTIN K , WANG W . Aya:an efficient access-controlled storage and processing for cloud-based sensed data[C]// 12th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP). 2015: 130-134. |
[28] | SAHA S , . Secure sensor data management model in a sensor-cloud integration environment[C]// Applications and Innovations in Mobile Computing (AIMoC). 2015: 158-163. |
[72] | TIAN W , ZHOU J Y , WANG G J ,et al. Three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing[J]. IEEEE Transactions on Emerging Topics in Computational Intelligence, 2018,2(1): 3-12. |
[73] | GARCIA LOPEZ P , MONTRESOR A , EPEMA D ,et al. Edge-centric computing:vision and challenges[J]. ACM SIGCOMM Computer Communication Review, 2015,45(5): 37-42. |
[29] | ZHOU J , CAO Z , DONG X ,et al. Security and privacy in cloud-assisted wireless wearable communications:challenges,solutions,and future directions[J]. IEEE Wireless Communications, 2015,22(2): 136-144. |
[30] | HENZE M , HERMERSCHMIDT L , KERPEN D ,et al. A comprehensive approach to privacy in the cloud-based internet of things[J]. Future Generation Computer Systems, 2016,56: 701-718. |
[31] | BRUNEO D , DISTEFANO S , LONGO F ,et al. IoT-cloud authorization and delegation mechanisms for ubiquitous sensing and actuation[C]// 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). 2016: 222-227. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Ling MA, Qiliang FAN, Ting XU, Guanchen GUO, Shenglin ZHANG, Yongqian SUN, Yuzhi ZHANG. Scheduling framework based on reinforcement learning in online-offline colocated cloud environment [J]. Journal on Communications, 2023, 44(6): 90-102. |
[3] | Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN. Intelligent planning method for cyber defense strategies based on bounded rationality [J]. Journal on Communications, 2023, 44(5): 52-63. |
[4] | Yuancheng LI, Yongtai QIN. Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform [J]. Journal on Communications, 2023, 44(5): 181-192. |
[5] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[6] | Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG. Study of SDN intrusion intent identification algorithm based on Bayesian attack graph [J]. Journal on Communications, 2023, 44(4): 216-225. |
[7] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[8] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[9] | Yue ZHAO, Zan LI, Bing LI, Benjian HAO. TDoA localization-refused area analysis and node placement strategy research [J]. Journal on Communications, 2023, 44(1): 1-13. |
[10] | Caixia LIU, Xinsheng JI, Jiangxing WU. Endogenous security common problems and solutions of the mobile communication networks [J]. Journal on Communications, 2022, 43(9): 70-79. |
[11] | Runhua SHI, Hui YU, Weiyang KE, Xiaotong XU. Quantum anonymous one-vote veto protocol based on BB84 states [J]. Journal on Communications, 2022, 43(8): 109-120. |
[12] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
[13] | Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU. Fusion of Focal Loss’s cyber threat intelligence entity extraction [J]. Journal on Communications, 2022, 43(7): 85-92. |
[14] | Cuiran LI, Xuejie WANG, Jianli XIE, Anqi LYU. Routing algorithm for railway monitoring linear WSN based on improved PSO [J]. Journal on Communications, 2022, 43(5): 155-165. |
[15] | Hongbin LUO, Shan ZHANG, Zhiyuan WANG. Architecture and mechanisms for secure and efficient internetworking of heterogeneous network [J]. Journal on Communications, 2022, 43(4): 36-49. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|