Skip to main content
Erschienen in: World Wide Web 1/2018

10.05.2017

Trustworthy service composition with secure data transmission in sensor networks

verfasst von: Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong

Erschienen in: World Wide Web | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As the basis of the Internet of Things (IoT), sensor networks have materialized its computation and communication capability into anything in our modern lives. Service composition provides us a promising way to cooperate various sensors to build more powerful IoT applications over sensor networks. However, the limited capability of sensor node poses great challenges not only to trustworthy service composition but also to secure data aggregation. The complex composite structure, computation-intensive evaluation, and massive data transmission become burdens for service composition in sensor networks. To overcome these issues, this paper proposes a distributed approach to enable efficient trustworthy service composition with secure data transmission in sensor networks. By analyzing dependency relationships, the rules for computing service trust and data trust are proposed based a multi-level trust model. Then, each target component service can be evaluated independently through a model checker. Moreover, an identity-based aggregate signature is introduced in the composite evaluation to guarantee the secure data transmission among different components. The experimental results show that our approach not only achieves efficient trustworthy service composition with complex invocation structures, but also reduces the costs in the secure data transmission.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
4.
5.
Zurück zum Zitat Hutter, D., Volkamer, M.: Information flow control to secure dynamic web service composition, pp 196–210. Springer Berlin Heidelberg, Berlin, Heidelberg (2006) Hutter, D., Volkamer, M.: Information flow control to secure dynamic web service composition, pp 196–210. Springer Berlin Heidelberg, Berlin, Heidelberg (2006)
7.
Zurück zum Zitat Kyusakov, R., Eliasson, J., Delsing, J., Van Deventer, J., Gustafsson, J.: Integration of wireless sensor and actuator nodes with it infrastructure using service-oriented architecture. IEEE Trans. Indust. Inform. 9(1), 43–51 (2013). doi:10.1109/TII.2012.2198655 CrossRef Kyusakov, R., Eliasson, J., Delsing, J., Van Deventer, J., Gustafsson, J.: Integration of wireless sensor and actuator nodes with it infrastructure using service-oriented architecture. IEEE Trans. Indust. Inform. 9(1), 43–51 (2013). doi:10.​1109/​TII.​2012.​2198655 CrossRef
9.
Zurück zum Zitat Liang, X., Li, X., Lu, R., Lin, X., Shen, X.: Seer: A secure and efficient service review system for service-oriented mobile social networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 647–656 (2012). doi:10.1109/ICDCS.2012.46 Liang, X., Li, X., Lu, R., Lin, X., Shen, X.: Seer: A secure and efficient service review system for service-oriented mobile social networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 647–656 (2012). doi:10.​1109/​ICDCS.​2012.​46
10.
Zurück zum Zitat Liu, X., Zhu, H., Ma, J., Li, Q., Xiong, J.: Efficient attribute based sequential aggregate signature for wireless sensor networks. Int. J. Sensor Netw. 16(3), 172–184 (2014)CrossRef Liu, X., Zhu, H., Ma, J., Li, Q., Xiong, J.: Efficient attribute based sequential aggregate signature for wireless sensor networks. Int. J. Sensor Netw. 16(3), 172–184 (2014)CrossRef
11.
Zurück zum Zitat Malik, Z., Bouguettaya, A.: Rateweb: Reputation assessment for trust establishment among web services. VLDB J. 18(4), 885–911 (2009)CrossRef Malik, Z., Bouguettaya, A.: Rateweb: Reputation assessment for trust establishment among web services. VLDB J. 18(4), 885–911 (2009)CrossRef
12.
Zurück zum Zitat Shen, L., Ma, J., Liu, X., Wei, F., Miao, M.: A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J. PP(99), 1–1 (2016). doi:10.1109/JIOT.2016.2557487 Shen, L., Ma, J., Liu, X., Wei, F., Miao, M.: A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J. PP(99), 1–1 (2016). doi:10.​1109/​JIOT.​2016.​2557487
14.
Zurück zum Zitat Snelting, G., Robschink, T., Krinke, J.: Efficient path conditions in dependence graphs for software safety analysis. ACM Trans. Softw. Eng. Methodol. 15(4), 410–457 (2006). doi:10.1145/1178625.1178628 CrossRef Snelting, G., Robschink, T., Krinke, J.: Efficient path conditions in dependence graphs for software safety analysis. ACM Trans. Softw. Eng. Methodol. 15(4), 410–457 (2006). doi:10.​1145/​1178625.​1178628 CrossRef
17.
Zurück zum Zitat Xi, N., Ma, J., Sun, C., Zhang, T.: Decentralized information flow verification framework for the service chain composition in mobile computing environments. In: 2013 IEEE 20th International Conference on Web Services (ICWS), pp. 563–570 (2013). doi:10.1109/ICWS.2013.81 Xi, N., Ma, J., Sun, C., Zhang, T.: Decentralized information flow verification framework for the service chain composition in mobile computing environments. In: 2013 IEEE 20th International Conference on Web Services (ICWS), pp. 563–570 (2013). doi:10.​1109/​ICWS.​2013.​81
20.
Zurück zum Zitat Yang, P., Yang, Z., Lu, S.: Formal modeling and analysis of scientific workflows using hierarchical state machines. In: IEEE International Conference on e-Science and Grid Computing. doi:10.1109/E-SCIENCE.2007.35 (2007) Yang, P., Yang, Z., Lu, S.: Formal modeling and analysis of scientific workflows using hierarchical state machines. In: IEEE International Conference on e-Science and Grid Computing. doi:10.​1109/​E-SCIENCE.​2007.​35 (2007)
22.
Zurück zum Zitat Zhang, T., Ma, J., Li, Q., Xi, N., Sun, C.: Trust-based service composition in multi-domain environments under time constraint. Sci. China Inf. Sci. 57(9), 1–16 (2014). doi:10.1007/s11432-014-5104-x Zhang, T., Ma, J., Li, Q., Xi, N., Sun, C.: Trust-based service composition in multi-domain environments under time constraint. Sci. China Inf. Sci. 57(9), 1–16 (2014). doi:10.​1007/​s11432-014-5104-x
23.
Zurück zum Zitat Zhang, T., Ma, J., Sun, C., Li, Q., Xi, N.: Service composition in multi-domain environment under time constraint. In: ICWS, pp. 227–234 (2013). doi:10.1109/ICWS.2013.39 Zhang, T., Ma, J., Sun, C., Li, Q., Xi, N.: Service composition in multi-domain environment under time constraint. In: ICWS, pp. 227–234 (2013). doi:10.​1109/​ICWS.​2013.​39
24.
Zurück zum Zitat Zhang, T., Ma, J., Xi, N., Liu, X., Liu, Z., Xiong, J.: Trustworthy service composition in service-oriented mobile social networks. In: 2014 IEEE International Conference on Web Services (ICWS), pp. 684–687 (2014). doi:10.1109/ICWS.2014.102 Zhang, T., Ma, J., Xi, N., Liu, X., Liu, Z., Xiong, J.: Trustworthy service composition in service-oriented mobile social networks. In: 2014 IEEE International Conference on Web Services (ICWS), pp. 684–687 (2014). doi:10.​1109/​ICWS.​2014.​102
Metadaten
Titel
Trustworthy service composition with secure data transmission in sensor networks
verfasst von
Tao Zhang
Lele Zheng
Yongzhi Wang
Yulong Shen
Ning Xi
Jianfeng Ma
Jianming Yong
Publikationsdatum
10.05.2017
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 1/2018
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0465-x

Weitere Artikel der Ausgabe 1/2018

World Wide Web 1/2018 Zur Ausgabe