skip to main content
research-article

A remote attestation mechanism for the sensing layer nodes of the Internet of Things

Published: 01 January 2018 Publication History

Abstract

Trusted transmission of data in sensing layer is the basis of security of Internet of Things so in data transmission process the trust of sensing node needs real-time confirmation and the track of the node is also needed. But the most current remote attestation mechanisms cannot achieve real-time trust attestation of sensing nodes and cannot track the node, if the node is an untrusted one, and these mechanisms also have poor environmental adaptability, so the current remote attestation mechanisms are not suitable for the sensing layer nodes in the Internet of Things. To solve the above problems, a remote attestation mechanism for the sensing layer nodes in the Internet of Things is presented in this paper. Firstly, the formal description of the sensor nodes is given; secondly, based on the formal description, a real-time trust measurement for the sensing nodes is proposed and the real-time trust measurement for the sensing nodes is realized; thirdly by encapsulating the properties and trust value of sensing node, the real-time tracing of the trust of nodes are realized in data transmission process. The security of this mechanism is proved in the standard model, meanwhile, this mechanism will not expose the privacy of nodes in the process of attestation, and it can trace the untrusted nodes. The simulation experiment shows that this mechanism can resist the attacks to the sensing nodes and can effectively improve the trust rate of data transmission, and this mechanism has good dynamic adaptability to network environment. This mechanism is simple and efficient, meanwhile the mechanism is flexible and easy to implement. In this paper, a remote attestation mechanism for the sensing layer nodes in the Internet of Things is presented in this paper.Firstly, the formal description of the sensor nodes is given; secondly, based on the formal description, a real-time trust measurement for the sensing nodes is proposed and the real-time trust measurement for the sensing nodes is realized; thirdly by encapsulating the properties and trust value of sensing node, the real-time tracing of the trust of nodes are realized in data transmission process.The security of this mechanism is proved in the standard model, meanwhile, this mechanism will not expose the privacy of nodes in the process of attestation, and it can trace the untrusted nodes.The simulation experiment shows that this mechanism can resist the attacks to the sensing nodes and can effectively improve the trust rate of data transmission, and this mechanism has good dynamic adaptability to network environment.This mechanism is simple and efficient, meanwhile the mechanism is flexible and easy to implement.

References

[1]
R. Romana, J. Zhoua, J. Lopezb, On the features and challenges of security & privacy in distributed Internet of things, Comput. Netw., 57 (2013) 2266-2279.
[2]
ITU, The Internet of Things{M/OL}, http://www.itu.int/osg/spu/publications/internetofthings/.
[3]
D. Bassi, G. Horn, Internet of Things in 2020, Roadmap for the Future{M/OL}, http://www.iot-visitthefuture.eu/fileadmin/documents/researchforeurope/270808_IoT_in_2020_Workshop_Report_V1-1.pdf .
[4]
L. Atzori, A. Iera, G. Morabito, The Internet of Things: A survey, Comput. Netw., 54 (2010) 2787-2805.
[5]
L. Xu, W. He, S. Li, Internet of Things in Industries: A Survey, IEEE Trans. Ind. Inform. (2014).
[6]
Chun-Wei Tsai, Chin-Feng Lai, Athanasios V. Vasilakos, Future Internet of things: open issues and challenges, Wirel. Netw., 20 (2014) 2201-2217.
[7]
S. Dhananjay, T. Gaurav, A.J. Jara, A survey of Internet-of-things: Future vision, architecture, challenges and services, in: Proc. of the 2014 IEEE World Forum on Internet of Things (WF-IoT), IEEE, 2014, pp. 287-292.
[8]
Fu Dong lai, Taiyuan University of Technology, 2016.
[9]
Trusted Computing Group {EB/OfL}. https://www.trustedcoinputinggroup.org. Nov, 2011.
[10]
Trusted Computing Group. Protection profile of PC client specific trusted platform module TPM Family 1.2{EB/0L}. http://www.trustedcomputinggroup.org/resources/tpm_l 2jprotection_profile/, Dec, 2011.
[11]
Trusted Computing Group, TCG Specification architecture overview specification revision 1.2 {EB/OL}. http://www.trustedcoinputinggroup.org, Nov, 2011.
[12]
Trusted Computing Group. TPM specification 2.0{EB/OL}. https://www.trustedcomputinggroup.org/resources/tpm_library_specification,2016-03-09 .
[13]
W. Xu, X. Zhang, H. Hu, Remote attestation with domain-based integrity model and policy analysis, IEEE Trans. Dependable Secure Comput., 9 (2012) 429-442.
[14]
V. Haldar, D. Chandra, M. Franz, Semantic remote attestationVirtual machine directed approach to trusted computing, in: Proceedings of the 3rd VirtualMachine Research and Technology Symposium,San Jose, CA,USA, May 67, 2004.
[15]
L. Zhu, Z. Zhang, L. Liao, Springer Berlin Heidelberg, Germany, 2012.
[16]
A.-R. Sadeghi, C. StUble, Property-based attestation for computing platforms:caring about properties, not mechanisms? in: C. Hempelmann and V. Raskin, editors, Proceedings of the New Security Paradigms Workshop 2004, Nova Scotia, Canada, September 2023, 2004, pp. 6777.
[17]
Liqun Chen, A Protocol for Property Based Attestation, in: A Protocol for Property Based Attestation, ACM, Alexandria, Virginia, USA, 2006, pp. 7-16.
[18]
Li Xiao yon, Zuo Xiao dong, Shen Chang xiang, System Behavior Based Trustworthiness Attestation for Computing Platform, Acta Electron. Sin., 35 (2007) 1234-1239.
[19]
A. Seshadri, M. Luk, A. Perrig, L.van. Doom, P. Khosla, Externally Verifiable Code Execution, Commun. ACM, 49 (2006) 45-49.
[20]
J. Poritz, M. Schunter, E. Van Herreweghe, IBM, New York, 2004.
[21]
Tan Liang, Chen Ju, Remote Attestation Project of the Running Environment of the Trusted Terminal, Journal of Softwar, 25 (2014) 1273-1290.
[22]
R. Korthaus, A.R. Sadeghi, C. Stble, A practical property-based bootstrap architecture, in: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, ACM Press, USA, 2009, pp. 29-38.
[23]
Zhao Jia1, Han Zhen, Liu Jiqiang, Zhang Rui, Remote Attestation Based on Trusted Cryptography Module, Journal of Beijing Jiaotong University (2010) 33-37.
[24]
M. Alam, M. Nauman, X. Zhang, Behavioral attestation for web services based business processes, Int. J. Web Serv. Res., 7 (2010) 52-72.
[25]
E. Brickell, L. Chen, J. Li, Simplified security notions for direct anonymous attestation and a concrete scheme from pairings. Cryptology eprint Archive, March, 2008.
[26]
Z. Huanguo, W. Fan, A behavior-based remote trust attestation model, Wuhan Univ. J. Nat. Sci., 11 (2006) 1819-1822.
[27]
Chen Liqun, A DAA scheme using batch proof and verification, in: Proc of the 3rd Internet Conf on Trust and Trustworthy Computing, Springer, Berlin, 2010, pp. 166-180.
[28]
M. Sarvabhatla, M. Giri, C.S. Vorugunti, Cryptanalysis of a biometric-based user authentication scheme for heterogeneous wireless sensor networks, in: 2014 Seventh International Conference on Contemporary Computing, IC3, Noida, 2014, pp. 312317.
[29]
K. Ntalianis, N. Tsapatsoulis, Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks, IEEE Trans. Emerging Top. Comput., 4 (2016) 156-174.
[30]
J. Yu, G. Wang, Y. Mu, W. Gao, An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation, IEEE Trans. Inf. Forensics Secur., 9 (2014) 2302-2313.
[31]
P. Gasti, J. ednka, Q. Yang, G. Zhou, K.S. Balagani, Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones, IEEE Trans. Inf. Forensics Secur., 11 (2016) 2556-2571.
[32]
T. Bhattasali, K. Saeed, Two factor remote authentication in healthcare, in: 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI, New Delhi, 2014, pp. 380386.
[33]
C. Zhang, X. Lin, R. Lu, P. Ho, RAISE: An Efficient RSU-aided MessageAuthentication Scheme in Vehicular Communication Networks, Communications Society (2008) 1451-1457.
[34]
A. Aijaz, B. Bochow, F. Dotzer, A. Festag, M. Gerlach, R. Kroh, T. Leinmuller, Attacks on Inter Vehicle Communication Systems - an Analysis, in 3rd International Workshop on Intelligent Transportation, 2006.
[35]
G. Guette, B. Ducourthial, On the Sybil attack detection in VANET, in: 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, IEEE, 2007, pp. 1-6.
[36]
M. Gerlach, Trust for vehicular applications, Autonomous Decentralized Systems, in: 2007. ISADS07. Eighth International Symposium, 2007, pp. 295304.
[37]
P. Cencioni, Pietro R.D., VIPER: A vehicle-to-infrastructure communication privacy enforcement protocol, Mobile Adhoc and Sensor Systems (2008) 1-6.
[38]
J.Y. Choi, M. Jakobsson, S. Wetzel, Balancing auditability and privacy in vehicular networks, in: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet05, 2005, p. 79.
[39]
C. Lesjak, D. Hein, J. Winter, Hardware-security technologies for industrial IoT: TrustZone and security controller, in: IECON 201541st Annual Conference of the IEEE Industrial Electronics Society, Yokohama, 2015, pp. 002589002595.
[40]
H. Dagale, et al., CyPhyS+: A reliable and managed cyber-physical system for old-age home healthcare over a 6LoWPAN using wearable motes, in: 2015 IEEE International Conference on Services Computing, New York, NY, 2015, pp. 309316.
[41]
A. Rghioui, A. Laarje, F. Elouaai, M. Bouhorma, The Internet of Things for healthcare monitoring: Security review and proposed solution, in: 2014 Third IEEE International Colloquium in Information Science and Technology, CIST, Tetouan, 2014, pp. 384389.
[42]
M. Sarvabhatla, M. Giri, C.S. Vorugunti, Cryptanalysis of a biometric-based user authentication scheme for heterogeneous wireless sensor networks, in: 2014 Seventh International Conference on Contemporary Computing, IC3, Noida, 2014, pp. 312317.
[43]
K. Ntalianis, N. Tsapatsoulis, Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks, IEEE Trans. Emerging Top. Comput., 4 (2016) 156-174.
[44]
Y. Ren, A. Bonkerche, Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks, in: Proc, of the 2009 IEEE International Conference on Communications, ICC 2009, Dresden, Gmnany, June 2009, pp. 5355539.
[45]
Zhaobing Cai, Qilong Han, Zhenguo Gao, Desen Yang, Jing Zhao, Research on cloud trust model for malicious node detection in wireless sensor network, Acta Electron. Sin., 40 (2012) 2232-2238.
[46]
S. Ganeriwal, L.K. Balzano, M.B Srivastava, Reputation-based framework for high integrity sensor networks., ACM Trans. Sens. Netw. (TOSN), 4 (2008).
[47]
C. Kamhoua, N. Pissinou, K. Maldd, Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy, in: Proc. of the 2011 IEEE International Conference on Communications, ICC 2011, yoto, Japan, June 2011, pp. 16.
[48]
D. Boneh, B. Lynn, H. Shacham, Short signatures from the Weil pairing, in: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security. Gold Coast, Australia, 2001, pp. 514532.
[49]
I.-R. Chen, J. Guo, Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection, in: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, 2014, pp. 4956.
[50]
D. Chen, G. Chang, D. Sun, J. Li, J. Jia, X. Wang, TRM-IoT: A trust management model based on fuzzy reputation for internet of things, Comput. Sci. Inf. Syst., 8 (2011) 1207-1228.
[51]
G. Schryen, M. Volkamer, S. Ries, S.M. Habib, A Formal Approach Towards Measuring Trust in Distributed Systems, 2011, pp. 17391745.
[52]
M. Anuar, M. Isa, N.N. Mohamed, H. Hashim, S. Farid, S. Adnan, J.A. Manan, R. Mahmod, A Lightweight and Secure TFTP Protocol for Smart Environment, no. Iscaie, 2012. pp. 302306.
[53]
A. Mana, H. Koshutanski, E.J. Perez, A trust negotiation based security framework for service provisioning in load-balancing clusters, Comput. Secur., 31 (2012) 4-25.
[54]
W.U. Qiu-xin, Secure solution of trusted Internet of things base on TCM, J. China Univ. Posts Telecommun, 20 (2013) 47-53.
[55]
A.F. Skarmeta, J.L. Hernandez-Ramos, M.V. Moreno, A decentralized approach for security and privacy challenges in the Internet of Things, in: 2014 IEEE World Forum on Internet of Things, WF-IoT 2014, 2014, pp. 6772.
[56]
X. Xu, N. Bessis, J. Cao, An Autonomic Agent Trust Model for IoT systems, Vol. 21, 2013, pp. 107113.
[57]
Y. Ben, A. Olivereau, D. Zeghlache, M. Laurent, Trust management system design for the Internet of Things: A contextaware and multi- service approach, Comput. Secur., 39 (2013) 351-365.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Future Generation Computer Systems
Future Generation Computer Systems  Volume 78, Issue P3
January 2018
172 pages

Publisher

Elsevier Science Publishers B. V.

Netherlands

Publication History

Published: 01 January 2018

Author Tags

  1. Internet of Things
  2. Remote attestation
  3. Sensing layer nodes
  4. Trust measurement
  5. Trust of data

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media