浏览全部资源
扫码关注微信
1. 华侨大学计算机科学与技术学院,福建 厦门 361021
2. 澳门大学数据科学中心,澳门 999078
3. 上海交通大学电子信息与电气工程学院,上海 200240
4. 广州大学计算机科学与教育软件学院,广东 广州 510006
[ "王田(1982-),男,湖南汨罗人,博士,华侨大学教授,主要研究方向为物联网及其安全问题、云计算技术、社交网络、软件安全、大数据处理等。" ]
[ "张广学(1992-),男,河南开封人,华侨大学硕士生,主要研究方向为雾计算、传感云、物联网及其安全问题等。" ]
[ "蔡绍滨(1973-),男,辽宁辽中人,博士,华侨大学教授、博士生导师,主要研究方向为物联网、海洋监测网络、网络计算、信息安全等。" ]
[ "贾维嘉(1957-),男,中国香港人,博士,上海交通大学教授、博士生导师,主要研究方向为下一代无线通信、协议、异构网络等。" ]
[ "王国军(1970-),男,湖南长沙人,博士,广州大学教授、博士生导师,主要研究方向为网络和信息安全、物联网和云计算等。" ]
网络出版日期:2018-06,
纸质出版日期:2018-06-25
移动端阅览
王田, 张广学, 蔡绍滨, 等. 传感云中的信任评价机制研究进展[J]. 通信学报, 2018,39(6):37-51.
Tian WANG, Guangxue ZHANG, Shaobin CAI, et al. Survey on trust evaluation mechanism in sensor-cloud[J]. Journal on communications, 2018, 39(6): 37-51.
王田, 张广学, 蔡绍滨, 等. 传感云中的信任评价机制研究进展[J]. 通信学报, 2018,39(6):37-51. DOI: 10.11959/j.issn.1000-436x.2018098.
Tian WANG, Guangxue ZHANG, Shaobin CAI, et al. Survey on trust evaluation mechanism in sensor-cloud[J]. Journal on communications, 2018, 39(6): 37-51. DOI: 10.11959/j.issn.1000-436x.2018098.
传感云系统逐渐发展为一个研究热点。好的信任评价机制能够解决这种新结构中存在的内部攻击等一些安全问题,并且能更好地保障该结构中信息的安全、高效传输。通过对传感云和信任评价机制进行广泛的调研,归纳出传感云的信任评价机制可分为实体间和实体内2类,对比现有信任评价机制的优点与不足,设计了基于雾计算模式的新型信任评价模型,探讨了未来的研究方向。
Sensor-cloud has gradually developed into a research hotspot.A good trust evaluation mechanism can better address some security issues in this new structure
such as internal attacks.A good trust evaluation mechanism can also ensure the security and efficient transmission of information in this structure.After an extensive research on sensor-cloud and trust evaluation mechanisms
it was found that trust evaluation mechanisms in sensor-cloud can be divided into two categories
among entities and in entity.After comparing the advantages and shortcomings of existing trust evaluation mechanisms
a new fog-based trust evaluation mechanism was designed and future research directions of trust evaluation mechanisms were discussed in sensor-cloud.
CHATTERJEE S , LADIA R , MISRA S . Dynamic optimal pricing for heterogeneous service-oriented architecture of sensor-cloud infrastructure [J ] . IEEE Transactions on Services Computing , 2017 , 10 ( 2 ): 203 - 216 .
MISRA S , CHATTERJEE S , OBAIDAT M S . On theoretical modeling of sensor cloud:a paradigm shift from wireless sensor network [J ] . IEEE Systems Journal , 2017 , 11 ( 2 ): 1084 - 1093 .
曾建电 , 王田 , 贾维嘉 , 等 . 传感云研究综述 [J ] . 计算机研究与发展 , 2017 , 54 ( 5 ): 925 - 939 .
ZENG J D , WANG T , JIA W J , et al . A survey on sensor-cloud [J ] . Journal of Computer Research and Development , 2017 , 54 ( 5 ): 925 - 939 .
MADRIA S K , . Sensor cloud:a cloud of sensor networks [C ] // 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) . 2017 : 2660 - 2661 .
ALAMRI A , ANSARI W S , HASSAN M M , et al . A survey on sensor-cloud:architecture,applications,and approaches [J ] . International Journal of Distributed Sensor Networks , 2013 ( 6 ):18.
RASHID B , REHMANI M H . Applications of wireless sensor networks for urban areas:a survey [J ] . Journal of Network and Computer Applications , 2016 , 60 : 192 - 219 .
RAWAT P , SINGH K D , CHAOUCHI H , et al . Wireless sensor networks:a survey on recent developments and potential synergies [J ] . The Journal of Supercomputing , 2014 , 68 ( 1 ): 1 - 48 .
RITTINGHOUSE J W , RANSOME J F . Cloud computing:implementation,management,and security [M ] . CRC Press , 2016 .
COUTINHO E F , SOUSA F R D C , REGO P A L , et al . Elasticity in cloud computing:a survey [J ] . Annals of Telecommunications Annales Des Télécommunications , 2015 , 70 ( 7-8 ): 289 - 309 .
YURIYAMA M , KUSHIDA T . Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing [C ] // International Conference on Network-Based Information Systems . 2010 : 1 - 8 .
BOSE S , GUPTA A , ADHIKARY S , et al . Towards a sensor-cloud infrastructure with sensor virtualization [C ] // IEEE International Conference on Cyber Security and Cloud Computing . 2015 : 25 - 30 .
HUH E N , ABAWAJY J . Emerging sensor-cloud technology for pervasive services and applications [J ] . International Journal of Distributed Sensor Networks , 2016 , 2014 ( 1 ): 1 - 3 .
MEHVAR R , ZHANG X . Optimal gateway selection in sensor-cloud framework for health monitoring [J ] . IET Wireless Sensor Systems , 2013 , 4 ( 2 ): 61 - 68 .
CHATTERJEE S , MISRA S . Target tracking using sensor-cloud:Sensor-target mapping in presence of overlapping coverage [J ] . IEEE Communications Letters , 2014 , 18 ( 8 ): 1435 - 1438 .
MISRA S , SINGH A , CHATTERJEE S , et al . Mils-cloud:a sensor-cloud-based architecture for the integration of military tri-services operations and decision making [J ] . IEEE Systems Journal , 2016 , 10 ( 2 ): 628 - 636 .
BHUIYAN M Z A , WANG G , WU J , et al . Dependable structural health monitoring using wireless sensor networks [J ] . IEEE Transactions on Dependable and Secure Computing , 2017 , 14 ( 4 ): 363 - 376 .
TSO R , ALELAIWI A , RAHMAN S M M , et al . Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud [J ] . Journal of Signal Processing Systems , 2016 : 1 - 9 .
LIU J , SHEN S , YUE G , et al . A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud [J ] . Applied Soft Computing Journal , 2015 , 30 ( C ): 123 - 135 .
SEN A , MADRIA S . A risk assessment framework for wireless sensor networks in a sensor cloud [C ] // 2015 16th IEEE International Conference on Mobile Data Management (MDM) . 2015 : 38 - 41 .
GRANJAL J , MONTEIRO E , SILVA J S . Security in the integration of low-power wireless sensor networks with the internet:a survey [J ] . Ad Hoc Networks , 2015 , 24 : 264 - 287 .
JIANG J , HAN G , ZHU C , et al . A trust cloud model for underwater wireless sensor networks [J ] . IEEE Communications Magazine , 2017 , 55 ( 3 ): 110 - 116 .
HAN G , JIANG J , SHU L , et al . Management and applications of trust in wireless sensor networks:a survey [J ] . Journal of Computer & System Sciences , 2014 , 80 ( 3 ): 602 - 617 .
HU Y , WU Y , WANG H . Detection of insider selective forwarding attack based on monitor node and trust mechanism in WSN [J ] . Wireless Sensor Network , 2014 , 06 ( 11 ): 237 - 248 .
AHMED A , BAKAR K A , CHANNA M I , et al . A trust aware routing protocol for energy constrained wireless sensor network [J ] . Telecommunication Systems , 2016 , 61 ( 1 ): 123 - 140 .
XIANG M , LIU W , BAI Q , et al . The double-edged sword:revealing the critical role of structural hole in forming trust for securing Wireless sensor networks [C ] // 2015 International Telecommunication Networks and Applications Conference (ITNAC) . 2015 : 286 - 291 .
王国军 , 王田 , 贾维嘉 . 无线传感器网络中一种基于行进启发的地理位置路由 [J ] . 传感技术学报 , 2007 , 20 ( 2 ): 382 - 386 .
WANG G J , WANG T , JIA W J . March inspired geographic routing protocol in wireless sensor networks [J ] . Chinese Journal of Sensors and Actuators , 2007 , 20 ( 2 ): 382 - 386 .
AHMED A , BAKAR K A , CHANNA M I , et al . A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J ] . Frontiers of Computer Science , 2015 , 9 ( 2 ): 280 - 296 .
MACHHI S , JETHAVA G B . Feedback based trust management for cloud environment [C ] // International Conference on Information and Communication Technology for Competitive Strategies . 2016 :114.
YAN Z , ZHANG P , VASILAKOS A V . A survey on trust management for Internet of things [J ] . Journal of Network & Computer Applications , 2014 , 42 ( 3 ): 120 - 134 .
ISHMANOV F , MALIK A S , KIM S W , et al . Trust management system in wireless sensor networks:design considerations and research challenges [J ] . Transactions on Emerging Telecommunications Technologies , 2015 , 26 ( 2 ): 107 - 130 .
MANUEL P . A trust model of cloud computing based on quality of Service [J ] . Annals of Operations Research , 2015 , 233 ( 1 ): 281 - 292 .
GOVINDAN K , MOHAPATRA P . Trust computations and trust dynamics in mobile adhoc networks:a survey [J ] . IEEE Communications Surveys & Tutorials , 2012 , 14 ( 2 ): 279 - 298 .
WU J , CHEN L , YU Q , et al . Trust-aware media recommendation in heterogeneous social networks [J ] . World Wide Web , 2015 , 18 ( 1 ): 139 - 157 .
WANG T , LI Y , CHEN Y , et al . Fog-based evaluation approach for trustworthy communication in sensor-cloud system [J ] . IEEE Communications Letters , 2017 , 21 ( 11 ): 2532 - 2535 .
NOOR T H , SHENG Q Z , ZEADALLY S , et al . Trust management of services in cloud environments:obstacles and solutions [J ] . ACM Computing Surveys , 2013 , 46 ( 1 ): 1 - 30 .
SIDHU J , SINGH S . Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers [J ] . Journal of Grid Computing , 2016 : 1 - 25 .
PEARSON S , . Privacy,security and trust in cloud computing [M ] // Privacy and Security for Cloud Computing . Springer London , 2013 : 3 - 42 .
ZHU C , NICANFAR H , LEUNG V C M , et al . An authenticated trust and reputation calculation and management system for cloud and sensor networks integration [J ] . IEEE Transactions on Information Forensics & Security , 2014 , 10 ( 1 ): 118 - 131 .
MANUEL P . A trust model of cloud computing based on quality of service [J ] . Annals of Operations Research , 2015 , 233 ( 1 ): 281 - 292 .
WANG S , SUN L , SUN Q , et al . Reputation measurement of cloud services based on unstable feedback ratings [J ] . International Journal of Web & Grid Services , 2015 , 11 ( 4 ): 362 - 376 .
MAO C , LIN R , XU C , et al . Towards a trust prediction framework for cloud services based on PSO-driven neural network [J ] . IEEE Access , 2017 , 5 : 2187 - 2199 .
LIN G , WANG D , BIE Y , et al . MTBAC:a mutual trust based access control model in cloud computing [J ] . China Communications , 2014 , 11 ( 4 ): 154 - 162 .
HOSSEINI S B , SHOJAEE A , AGHELI N . A new method for evaluating cloud computing user behavior trust [C ] // Information and Knowledge Technology . 2015 : 1 - 6 .
LIU Z , PENG D . User behavior identification for trust management in pervasive computing systems [C ] // IEEE International Workshop on Future Trends of Distributed Computing Systems . 2007 : 65 - 72 .
JING X , LIU Z , LI S , et al . A cloud-user behavior assessment based dynamic access control model [J ] . International Journal of System Assurance Engineering & Management , 2015 : 1 - 10 .
SAVAS O , JIN G , DENG J . Trust management in cloud-integrated wireless sensor networks [C ] // International Conference on Collaboration Technologies and Systems . 2013 : 334 - 341 .
QIN D , YANG S , JIA S , et al . Research on trust sensing based secure routing mechanism for wireless sensor network [J ] . IEEE Access , 2017
JIANG J , HAN G , WANG F , et al . An efficient distributed trust model for wireless sensor networks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2015 , 26 ( 5 ): 1228 - 1237 .
DUAN J , GAO D , YANG D , et al . An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications [J ] . IEEE Internet of Things Journal , 2014 , 1 ( 1 ): 58 - 69 .
FANG W , ZHANG W , YANG Y , et al . A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution [J ] . Science China , 2017 , 60 ( 4 ):040305.
LIU Y , DONG M , OTA K , et al . ActiveTrust:secure and trustable routing in wireless sensor networks [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 9 ): 2013 - 2027 .
LI X , ZHOU F , DU J . LDTS:a lightweight and dependable trust system for clustered wireless sensor networks [J ] . IEEE Transactions on Information Forensics & Security , 2013 , 8 ( 6 ): 924 - 935 .
LABRAOUI N , GUEROUI M , SEKHRI L . A risk-aware reputation-based trust management in wireless sensor networks [J ] . Wireless Personal Communications , 2016 , 87 ( 3 ): 1037 - 1055 .
REDDY V B , VENKATARAMAN S , NEGI A . Communication and data trust for wireless sensor networks using D-S theory [J ] . IEEE Sensors Journal , 2017 , 17 ( 12 ): 3921 - 3929 .
CHATURVEDI P , DANIEL A K . Trust based node scheduling protocol for target coverage in wireless sensor networks [M ] // Emerging Research in Computing,Information,Communication and Applications . 2015 : 197 - 205 .
CHEN Z , HE M , LIANG W , et al . Trust-aware and low energy consumption security topology protocol of wireless sensor network [J ] . Journal of Sensors , 2015 , 2015 ( 1 ): 1 - 10 .
AHMED A , BAKAR K A , CHANNA M I , et al . Energy-aware and secure routing with trust for disaster response wireless sensor network [J ] . Peer-to-Peer Networking and Applications , 2017 , 10 ( 1 ): 216 - 237 .
GUO J , CHEN I R , TSAI J J P . A survey of trust computation models for service management in internet of things systems [J ] . Computer Communications , 2016 , 97 : 1 - 14 .
ANITA X , BHAGYAVENI M A , MANICKAM J M . Fuzzy-based trust prediction model for routing in WSN [J ] . The Scientific World Journal , 2014 , 2014 ( 2 ): 1 - 11 .
PRABHA V R , LATHA P . Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks [J ] . Sādhanā , 2017 : 1 - 9 .
MARZI H , LI M . An enhanced bio-inspired trust and reputation model for wireless sensor network [J ] . Procedia Computer Science , 2013 , 19 : 1159 - 1166 .
FENG R , CHE S , WANG X , et al . Trust management scheme based on D-S evidence theory for wireless sensor networks [J ] . International Journal of Distributed Sensor Networks , 2013 , 2013 ( 4 ): 130 - 142 .
GUPTA G P , MISRA M , GARG K . Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks [J ] . Journal of Network & Computer Applications , 2014 , 41 ( 1 ): 300 - 311 .
CHAE Y , DIPIPPO L C , SUN Y L . Trust management for defending on-off attacks [J ] . IEEE Transactions on Parallel and Distributed Systems , 2015 , 26 ( 4 ): 1178 - 1191 .
SHEN S , HUANG L , FAN E , et al . Trust dynamics in WSN:an evolutionary game-theoretic approach [J ] . Journal of Sensors , 2016 , 2016 : 1 - 10 .
FANG W , ZHANG C , SHI Z , et al . BTRES:Beta-based trust and reputation evaluation system for wireless sensor networks [J ] . Journal of Network & Computer Applications , 2016 , 59 : 88 - 94 .
REN Y , ZADOROZHNY V I , OLESHCHUK V A , et al . A novel approach to trust management in unattended wireless sensor networks [J ] . IEEE Transactions on Mobile Computing , 2014 , 13 ( 7 ): 1409 - 1423 .
BONOMI F , MILITO R , ZHU J , et al . Fog computing and its role in the internet of things [C ] // Edition of the Mcc Workshop on Mobile Cloud Computing . 2012 : 13 - 16 .
WANG T , PENG Z , WEN S , et al . Reliable wireless connections for fast-moving rail users based on a chained fog structure [J ] . Information Sciences , 2017 , 379 : 160 - 176 .
WANG T , ZENG J , BHUIYAN M Z A , et al . Trajectory privacy preservation based on a fog structure for Cloud location services [J ] . IEEE Access , 2017 , 5 : 7692 - 7701 .
VAQUERO L M , RODERO M L . Finding your way in the fog:towards a comprehensive definition of fog computing [J ] . ACM SIGCOMM Computer Communication Review , 2014 , 44 ( 5 ): 27 - 32 .
BAO F , CHEN R , CHANG M J , et al . Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection [J ] . IEEE transactions on network and service management , 2012 , 9 ( 2 ): 169 - 183 .
HONG K , LILLETHUN D , RAMACHANDRAN U , et al . Mobile fog:a programming model for large-scale applications on the internet of things [C ] // ACM SIGCOMM Workshop on Mobile Cloud Computing . 2013 : 15 - 20 .
BONOMI F , MILITO R , NATARAJAN P , et al . Fog computing:a platform for internet of things and analytics [M ] // Big Data and Internet of Things:A Roadmap for Smart Environments . Springer International Publishing , 2014 : 169 - 186 .
0
浏览量
1285
下载量
5
CSCD
关联资源
相关文章
相关作者
相关机构