浏览全部资源
扫码关注微信
1. 华侨大学计算机科学与技术学院,福建 厦门 361021
2. 澳门大学数据科学中心,澳门 999078
3. 上海交通大学电子信息与电气工程学院,上海 200240
4. 广州大学计算机科学与教育软件学院,广东 广州 510006
5. 国防科技大学计算机学院,湖南 长沙 410073
[ "王田(1982-),男,湖南汨罗人,博士,华侨大学教授,主要研究方向为物联网及其安全问题、云计算技术、社交网络、软件安全、大数据处理等。" ]
[ "李洋(1991-),女,湖北黄石人,华侨大学硕士生,主要研究方向为传感云安全、雾计算、物联网等。" ]
[ "贾维嘉(1957-),男,中国香港人,博士,上海交通大学教授、博士生导师,主要研究方向为下一代无线通信、协议、异构网络等。" ]
[ "王国军(1970-),男,湖南长沙人,博士,广州大学教授、博士生导师,主要研究方向为网络和信息安全、物联网和云计算等。" ]
[ "彭绍亮(1979-),男,湖南长沙人,博士,国防科技大学教授,主要研究方向为分布式系统、计算机性能和无线网络等。" ]
网络出版日期:2018-03,
纸质出版日期:2018-03-25
移动端阅览
王田, 李洋, 贾维嘉, 等. 传感云安全研究进展[J]. 通信学报, 2018,39(3):35-52.
Tian WANG, Yang LI, Weijia JIA, et al. Research progress of sensor-cloud security[J]. Journal on communications, 2018, 39(3): 35-52.
王田, 李洋, 贾维嘉, 等. 传感云安全研究进展[J]. 通信学报, 2018,39(3):35-52. DOI: 10.11959/j.issn.1000-436x.2018035.
Tian WANG, Yang LI, Weijia JIA, et al. Research progress of sensor-cloud security[J]. Journal on communications, 2018, 39(3): 35-52. DOI: 10.11959/j.issn.1000-436x.2018035.
通过调研大量的国内外传感云安全的相关文献发现,现有的传感云系统存在一系列严重的安全问题,如不同服务提供商的信誉问题、物理节点耦合漏洞、数据权限管理漏洞等,严重地阻碍了传感云系统的进一步发展。分析了传感云系统存在的安全问题,对比了现有的传感云安全技术,讨论总结了不同种类解决方案的优缺点,提出了未来传感云发展面临的安全挑战。最后,设计了基于雾计算框架下传感云安全的实现方案,为传感云的安全研究带来新的思路。
Through consulting lots of domestic and international literatures about sensor-cloud security
a series of security problems are found
such as reputation problem of service provider
the coupling problem of physical nodes
the leak of authority management
et al
which seriously hinders the further development of sensor-cloud.The secure problems occurring in sensor-cloud were analyzed
the current secure technologies were contrasted
similarities and differences of various types solutions were discussed and summarized.After that
several future challenges of sensor-cloud security were concluded.Finally
a fog-based structure was proposed to solve the security problems
which would bring new ideas to the sensor-cloud security research.
林闯 , 苏文博 , 孟坤 , 等 . 云计算安全:架构,机制与模型评价 [J ] . 计算机学报 , 2013 , 36 ( 9 ): 1765 - 1784 .
LIN C , SU W B , MENG K , et al . Cloud computing security:infrastructure,mechanism and model evaluation [J ] . Chinese Journal of Computers , 2013 , 36 ( 9 ): 1765 - 1784 .
王国军 , 王田 , 贾维嘉 . 无线传感器网络中一种基于行进启发的地理位置路由 [J ] . 传感技术学报 , 2007 , 20 ( 2 ): 382 - 386 .
WANG G J , WANG T , JIA W J . A travel-based position route in wireless sensor networks [J ] . Journal of Sensor Technology , 2007 , 20 ( 2 ): 382 - 286 .
WANG T , PENG Z , LIANG J B , et al . Following targets for mobile tracking in wireless sensor networks [J ] . ACM Transactions on Sensor Networks , 2016 , 12 ( 4 ): 1 - 24 .
张希伟 , 戴海鹏 , 徐力杰 , 等 . 无线传感器网络中移动协助的数据收集策略 [J ] . 软件学报 , 2013 , 24 ( 2 ): 198 - 214 .
ZHANG X W , DAI H P , XU L J , et al . Mobility assisted data collection strategy in wireless sensor network [J ] . Journal of Software , 2013 , 24 ( 2 ): 198 - 214 .
俞姝颖 , 吴小兵 , 陈贵海 , 等 . 无线传感器网络在桥梁健康监测中的应用 [J ] . 软件学报 , 2015 , 26 ( 6 ): 1486 - 1498 .
YU S Y , WU X B , CHEN G H , et al . Application of wireless sensor networks in bridge health monitoring [J ] . Journal of Software , 2015 , 26 ( 6 ): 1486 - 1498 .
DASH S K , SAHOO J P , MOHAPATRA S , et al . Sensor-cloud:assimilation of wireless sensor network and the cloud [C ] // International Conference on Computer Science and Information Technology . 2012 : 455 - 464 .
刘正伟 , 文中领 , 张海涛 . 云计算和云数据管理技术 [J ] . 计算机研究与发展 , 2012 , 49 ( 1 ): 26 - 31 .
LIU Z W , WEN Z L , ZHANG H T . Cloud computing and cloud data management technology [J ] . Computer Research and Development , 2012 , 49 ( 1 ): 26 - 31 .
WANG T,LI Y , WANG G J , CAO J N , et al . Sustainable and efficient data collection from WSNs to cloud [J ] . IEEE Transactions on Sustainable Computing , 2017 , PP ( 99 ): 1 - 12 .
曾建电 , 王田 , 贾维嘉 , 等 . 传感云研究综述 [J ] . 计算机研究与发展 , 2017 , 54 ( 5 ): 925 - 939 .
ZENG J D , WANG T , JIA W J , et al . Survey of sensor cloud [J ] . Computer Research and Development , 2017 , 54 ( 5 ): 925 - 939 .
MISRA S , BERA S , MONDAL A , et al . Optimal gateway selection in sensor-cloud framework for health monitoring [J ] . IET Wireless Sensor Systems , 2014 , 4 ( 2 ): 61 - 68 .
GERLA M , LEE E K , PAU G , et al . Internet of vehicles:from intelligent grid to autonomous cars and vehicular clouds [C ] // 2014 IEEE World Forum on Internet of Things (WF-IoT) . 2014 : 241 - 246 .
SIMMHAN Y , AMAN S , KUMBHARE A , et al . Cloud-based software platform for big data analytics in smart grids [J ] . Computing in Science & Engineering , 2013 , 15 ( 4 ): 38 - 47 .
YURIYAMA M , KUSHIDA T . Sensor-cloud infrastructure-physical sensor management with virtualized sensors on cloud computing [C ] // 13th International Conference on Network-Based Information Systems (NBiS) . 2010 : 1 - 8 .
GE Y , ZHANG X , HAN B . Complex IoT control system modeling from perspectives of environment perception and information security [J ] . Mobile Networks & Applications , 2017 , 22 ( 3 ): 1 - 9 .
DIPIETRO R , GUARINO S , VERDE N V , et al . Security in wireless ad hoc networks-a survey [J ] . Computer Communications , 2014 , 51 : 1 - 20 .
WANG T , PENG Z , WEN S , et al . Reliable wireless connections for fast-moving rail users based on a chained fog structure [J ] . Information Sciences , 2017 , 379 : 160 - 176 .
WANG T , LI Y , WANG G J , et al . Sustainable and efficient data collection from WSN to cloud [J ] . IEEE Transactions on Sustainable Computing , 2017 , PP ( 99 ): 1 - 12 .
CHEN M , MA Y , LI Y , et al . Wearable 2.0:enabling human-cloud integration in next generation healthcare systems [J ] . IEEE Communications Magazine , 2017 , 55 ( 1 ): 54 - 61 .
MAN H A , YUEN T H , LIU J K , et al . A general framework for secure sharing of personal health records in cloud system [J ] . Journal of Computer & System Sciences , 2017 .
CAI H , XU B , JIANG L , et al . IoT-based big data storage systems in cloud computing:Perspectives and challenges [J ] . IEEE Internet of Things Journal , 2017 , 4 ( 1 ): 75 - 87 .
LIU J , SHEN S , YUE G , et al . A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud [J ] . Applied Soft Computing , 2015 , 30 ( C ): 123 - 135 .
GARGEES R , MORAGO B , PELAPUR R , et al . Incident-supporting visual cloud computing utilizing software-defined networking [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2017 , 27 ( 1 ): 182 - 197 .
WANG T , LI Y , CHEN Y , et al . Fog-based evaluation approach for trustworthy communication in sensor-cloud system [J ] . IEEE Communications Letters , 2017 , 21 ( 11 ): 2532 - 2535 .
WINKLER T , RINNER B . Security and privacy protection in visual sensor networks:a survey [J ] . ACM Computing Surveys (CSUR) , 2014 , 47 ( 1 ):2.
HE D , KUMAR N . A secure temporal credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks [J ] . Information Sciences , 2015 , 321 : 263 - 277 .
SAJID A , ABBAS H , SALEEM K . Cloud-assisted IoT-based SCADA systems security:a review of the state of the art and future challenges [J ] . IEEE Access , 2016 , 4 : 1375 - 1384 .
MARTIN K , WANG W . Aya:an efficient access-controlled storage and processing for cloud-based sensed data [C ] // 12th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) . 2015 : 130 - 134 .
SAHA S , . Secure sensor data management model in a sensor-cloud integration environment [C ] // Applications and Innovations in Mobile Computing (AIMoC) . 2015 : 158 - 163 .
ZHOU J , CAO Z , DONG X , et al . Security and privacy in cloud-assisted wireless wearable communications:challenges,solutions,and future directions [J ] . IEEE Wireless Communications , 2015 , 22 ( 2 ): 136 - 144 .
HENZE M , HERMERSCHMIDT L , KERPEN D , et al . A comprehensive approach to privacy in the cloud-based internet of things [J ] . Future Generation Computer Systems , 2016 , 56 : 701 - 718 .
BRUNEO D , DISTEFANO S , LONGO F , et al . IoT-cloud authorization and delegation mechanisms for ubiquitous sensing and actuation [C ] // 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) . 2016 : 222 - 227 .
BUTUN I , MORGERA S D , SANKAR R . A survey of intrusion detection systems in wireless sensor networks [J ] . IEEE Communications Surveys & Tutorials , 2014 , 16 ( 1 ): 266 - 282 .
ALRAJEH N A , KHAN S , SHAMS B . Intrusion detection systems in wireless sensor networks:a review [J ] . International Journal of Distributed Sensor Networks , 2013 , 9 ( 5 ):167575.
SMIRNOV A V , BORISENKO K A , SHOROV A V , et al . Network traffic processing module for infrastructure attacks detection in cloud computing platforms [C ] // 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) . 2016 : 199 - 202 .
PATEL A , TAGHAVI M , BAKHTIYARI K , et al . An intrusion detection and prevention system in cloud computing:a systematic review [J ] . Journal of Network and Computer Applications , 2013 , 36 ( 1 ): 25 - 41 .
SINHA N , PUJITHA K E , ALEX J S R . Xively based sensing and monitoring system for IoT [C ] // International Conference on Computer Communication and Informatics (ICCCI) . 2015 : 1 - 6 .
RAY P P . A survey of IoT cloud platforms [J ] . Future Computing and Informatics Journal , 2016 , 1 ( 1-2 ): 35 - 46 .
SUHAIL S , HONG C S , AHMAD Z U , et al . Introducing secure provenance in IoT:requirements and challenges [C ] // International Workshop on Secure Internet of Things (SIoT) . 2016 : 39 - 46 .
DOUKAS C , MAGLOGIANNIS I . Bringing IoT and cloud computing towards pervasive healthcare [C ] // Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) . 2012 : 922 - 926 .
PASHA S . ThingSpeak based sensing and monitoring system for IoT with Matlab Analysis [J ] . International Journal of New Technology and Research (IJNTR) , 2016 , 2 ( 6 ): 19 - 23 .
LOUNIS A , HADJIDJ A , BOUABDALLAH A , et al . Secure and scalable cloud-based architecture for e-health wireless sensor networks [C ] // 21st International Conference on Computer Communications and Networks (ICCCN) . 2012 : 1 - 7 .
BAEK J , VU Q H , LIU J K , et al . A secure cloud computing based framework for big data information management of smart grid [J ] . IEEE Transactions on Cloud Computing , 2015 , 3 ( 2 ): 233 - 244 .
BUTUN I , EROL-KANTARCI M , KANTARCI B , et al . Cloud-centric multi-level authentication as a service for secure public safety device networks [J ] . IEEE Communications Magazine , 2016 , 54 ( 4 ): 47 - 53 .
BUTUN I , WANG Y , LEE Y , et al . Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks [J ] . International Journal of Security and Networks , 2012 , 7 ( 2 ): 107 - 121 .
BANAIE F , SENO S A H . A cloud-based architecture for secure and reliable service provisioning in wireless sensor network [C ] // 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE) . 2014 : 96 - 101 .
GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile ad hoc networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2012 , 14 ( 2 ): 279 - 298 .
JIANG J , HAN G , WANG F , et al . An efficient distributed trust model for wireless sensor networks [J ] . IEEE Transactions on Parallel & Distributed Systems , 2014 , 26 ( 5 ):1.
SAHA S , DAS R , DATTA S , et al . A cloud security framework for a data centric WSN application [C ] // The 17th International Conference on Distributed Computing and Networking . 2016 :39.
LOUNIS A , HADJIDJ A , BOUABDALLAH A , et al . Healing on the cloud:secure cloud architecture for medical wireless sensor networks [J ] . Future Generation Computer Systems , 2016 , 55 : 266 - 277 .
ALBUQUERQUE S L , GONDIM P R L . Security in cloud-computingbased mobile health [J ] . IT Professional , 2016 , 18 ( 3 ): 37 - 44 .
SHAH S H , KHAN F K , ALI W , et al . A new framework to integrate wireless sensor networks with cloud computing [C ] // Aerospace Conference . 2013 : 1 - 6 .
ZHU C , WANG H , LIU X , et al . A novel sensory data processing framework to integrate sensor networks with mobile cloud [J ] . IEEE Systems Journal , 2016 , 10 ( 3 ): 1125 - 1136 .
PONMAGAL R S , DINESH N , RAJARAM U . Design and development of secure cloud architecture for sensor services [C ] // International Conference on Distributed Computing and Internet Technology . 2015 : 339 - 344 .
GUAN Z , YANG T , DU X , et al . Secure data access for wireless body sensor networks [C ] // Wireless Communications and Networking Conference (WCNC) . 2016 : 1 - 6 .
HENZE M , HUMMEN R , MATZUTT R , et al . The sensorcloud protocol:securely outsourcing sensor data to the cloud [J ] . arXiv preprint arXiv:1607.03239 , 2016 .
GRANJAL J , MONTEIRO E , SILVA J S . Security in the integration of low-power wireless sensor networks with the internet:a survey [J ] . Ad Hoc Networks , 2015 , 24 : 264 - 287 .
YUEN T H , ZHANG Y , YIU S M , et al . Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks [C ] // European Symposium on Research in Computer Security . 2014 : 130 - 147 .
MISRA S , SINGH A , CHATTERJEE S , et al . Mils-cloud:a sensor-cloud-based architecture for the integration of military tri-services operations and decision making [J ] . IEEE Systems Journal , 2016 , 10 ( 2 ): 628 - 636 .
ZHU C , NICANFAR H , LEUNG V C M , et al . An authenticated trust and reputation calculation and management system for cloud and sensor networks integration [J ] . IEEE Transactions on Information Forensics & Security , 2015 , 10 ( 1 ): 118 - 131 .
WHITEHEAD J R . Cluster-based trust proliferation and energy efficient data collection in unattended wireless sensor networks with mobile sinks [D ] . Chattanooga:University of Tennessee , 2016 .
LUCA G D , CHEN Y . Visual IoT robotics programming language in pi-calculus [C ] // International Symposium on Autonomous Decentralized System . 2017 : 23 - 30 .
LOMOTEY R K , PRY J C , CHAI C . Traceability and visual analytics for the Internet-of-Things (IoT) architecture [J ] . World Wide Web-internet& Web Information Systems , 2017 ( 4 ): 1 - 26 .
GARGEES R , MORAGO B , PELAPUR R , et al . Incident-supporting visual cloud computing utilizing software-defined networking [J ] . IEEE Transactions on Circuits and Systems for Video Technology , 2017 , 27 ( 1 ): 182 - 197 .
ZHOU R , LAI Y , LIU Z , et al . A security authentication protocol for trusted domains in an autonomous decentralized system [J ] . International Journal of Distributed Sensor Networks , 2016 , 12 ( 3 ):5327949.
YOON K , PARK D , YIM Y , et al . Security authentication system using encrypted channel on UAV network [C ] // IEEE International Conference on Robotic Computing (IRC) . 2017 : 393 - 398 .
ZHANG Y , LYU M R . QoS-aware byzantine fault tolerance [M ] . QoS Prediction in Cloud and Service Computing . Singapore : SpringorPress , 2017 : 105 - 120 .
BHAT A , SAMII S , RAJKUMAR R . Practical task allocation for software fault-tolerance and its implementation in embedded automotive systems [C ] // Real-Time and Embedded Technology and Applications Symposium (RTAS) . 2017 : 87 - 98 .
ZHANG T , YAN L , YANG Y . Trust evaluation method for clustered wireless sensor networks based on cloud model [J ] . Wireless Networks , 2016 : 1 - 21 .
SUN D , ZHAO H , CHENG S . A novel membership cloud model-based trust evaluation model for vehicular ad hoc network of T-CPS [J ] . Security and Communication Networks , 2016 , 9 ( 18 ): 5710 - 5723 .
LI X , HE J , ZHAO B , et al . A method for trust quantification in cloud computing environments [J ] . International Journal of Distributed Sensor Networks , 2016 , 12 ( 2 ):5052614.
BONOMI F , MILITO R , ZHU J , et al . Fog computing and its role in the Internet of things [C ] // Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing . 2012 : 13 - 16 .
TIAN W , ZHOU J Y , WANG G J , et al . Three-layer privacy preserving cloud storage scheme based on computational intelligence in fog computing [J ] . IEEEE Transactions on Emerging Topics in Computational Intelligence , 2018 , 2 ( 1 ): 3 - 12 .
GARCIA LOPEZ P , MONTRESOR A , EPEMA D , et al . Edge-centric computing:vision and challenges [J ] . ACM SIGCOMM Computer Communication Review , 2015 , 45 ( 5 ): 37 - 42 .
0
浏览量
1805
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构