浏览全部资源
扫码关注微信
1. 嘉兴学院数理与信息工程学院,浙江 嘉兴 314001
2. 上海交通大学计算机科学与工程系,上海 200240
3. 上海师范大学信息与机电工程学院,上海 200234
[ "刘建华(1978−),男,博士,嘉兴学院数理与信息工程学院讲师,主要研究方向为无线传感器网络、云计算、网络与信息安全、博弈论。" ]
[ "李明禄(1965−),男,博士,上海交通大学计算机科学与工程系教授,主要研究方向为无线传感器网络、云计算与大数据、物联网。" ]
[ "李大志(1977−),男,上海交通大学计算机科学与工程系博士生,上海师范大学信息与机电工程学院讲师,主要研究方向为云计算与大数据、物联网。" ]
[ "李鲁群(1967−),男,博士,上海师范大学信息与机电工程学院教授,主要研究方向为无线传感器网络、群体智能算法。" ]
网络出版日期:2017-06,
纸质出版日期:2017-06-20
移动端阅览
刘建华, 李明禄, 李大志, 等. 工业无线传感云中面向移动机器人的自适应信任演化机制[J]. 电信科学, 2017,33(6):86-96.
Jianhua LIU, Minglu LI, Dazhi LI, et al. Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud[J]. Telecommunications science, 2017, 33(6): 86-96.
刘建华, 李明禄, 李大志, 等. 工业无线传感云中面向移动机器人的自适应信任演化机制[J]. 电信科学, 2017,33(6):86-96. DOI: 10.11959/j.issn.1000-0801.2017125.
Jianhua LIU, Minglu LI, Dazhi LI, et al. Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud[J]. Telecommunications science, 2017, 33(6): 86-96. DOI: 10.11959/j.issn.1000-0801.2017125.
在智能制造系统中,工业无线传感器网络和生产设备以分散的、无人值守的方式运行。传感云作为一种潜在的技术能有效地集成分散的设备为云服务并提供给移动机器人使用。当移动机器人通过传感云平台访问远程云设备时,由于潜藏的攻击者容易通过无线信道截获密钥并窃听设备操作内容,这使得密钥管理和设备操作权限的控制成为其安全、可靠运行的关键。形式化了博弈参与者的效用函数,对自适应信任度更新过程进行了分析
提出了基于演化博弈的自适应信任管理机制。仿真结果显示,提出的方法能有效提高传感云网络系统和设备的安全性。
Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However
when the mobile robots access the remote devices via sensor-cloud platform
because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels
which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore
the utility function of game players were formalized
the adaptive trust update process was analyzed
and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.
李伯虎 , 张霖 , 任磊 , 等 . 云制造典型特征、关键技术与应用 [J ] . 计算机集成制造系统 , 2012 , 18 ( 7 ): 1345 - 1356 .
LI B H , ZHANG L , REN L , et al . Typical characteristics,technologies and applications of cloud manufacturing [J ] . Computer Integrated Manufacturing Systems , 2012 , 18 ( 7 ): 1345 - 1356 .
江家仁 . 虚拟化安全—公有云安全的核心关键问题探讨 [J ] . 电信科学 , 2015 , 31 ( 12 ): 121 - 124 .
JIANG J R . Virtualization security,discussion on key issues of public cloud computing security [J ] . Telecommunications Science , 2015 , 31 ( 12 ): 121 - 124 .
李顺东 , 窦家维 , 王道顺 . 同态加密算法及其在云安全中的应用 [J ] . 计算机研究与发展 , 2015 , 52 ( 6 ): 1378 - 1388 .
LI S D , DOU J W , WANG D S . Survey on homomorphic encryption and its applications to cloud security [J ] . Journal of Computer Research and Development , 2015 , 52 ( 6 ): 1378 - 1388 .
郭强 , 孙大为 , 常桂然 , 等 . 一种基于虚拟化技术增强云安全的可信赖模型 [J ] . 东北大学学报(自然科学版) , 2011 , 32 ( 6 ): 786 - 790 .
GUO Q , SUN D W , CHANG G R , et al . A virtualization techniques based dependability model to enhance security of cloud computing environments [J ] . Journal of Northeastern University(Natural Science) , 2011 , 32 ( 6 ): 786 - 790 .
蔡红云 , 田俊峰 , 李珍 , 等 . 基于信任领域和评价可信度量的信任模型研究 [J ] . 计算机研究与发展 , 2011 , 48 ( 11 ): 2131 - 2138 .
CAI H Y , TIAN J F , LI Z,et.al . Trust model based on trust area and evaluation credibility [J ] . Journal of Computer Research and Development , 2011 , 48 ( 11 ): 2131 - 2138 .
YU Y , LI K , ZHOU W , et al . Trust mechanisms in wireless sensor networks:attack analysis and countermeasures [J ] . Journal of Network & Computer Applications , 2012 , 35 ( 3 ): 867 - 880 .
LOUATI A , HADDAD J E , PINSONP S . Trust-based coalition formation for dynamic service composition in social networks [M ] // Web Information Systems Engineering WISE 2015 . Heidelberg:Springer , 2015 : 570 - 585 .
陈亚睿 , 田立勤 , 杨扬 . 云计算环境下基于动态博弈论的用户行为模型与分析 [J ] . 电子学报 , 2011 , 39 ( 8 ): 1818 - 1823 .
CHEN Y R , TIAN L Q , YANG Y . Model and analysis of user behavior based on dynamic game theory in cloud computing [J ] . Chinese Journal of Electronics , 2011 , 39 ( 8 ): 1818 - 1823 .
肖云鹏 , 姚豪豪 , 刘宴兵 . 一种基于云模型的WSN节点信誉安全方案 [J ] . 电子学报 , 2016 , 44 ( 1 ): 168 - 175 .
XIAO Y P , YAO H H , LIU Y B . A WSN node reputation security scheme based on cloud model [J ] . Chinese Journal of Electronics , 2016 , 44 ( 1 ): 168 - 175 .
ZONOUZ S , HOUMANSADR A , BERTHIER R , et al . Secloud:a cloud-based comprehensive and lightweight security solution for smart phones [J ] . Computers & Security , 2013 , 37 ( 9 ): 215 - 227 .
NITTI M , GIRAU R , ATZORI L . Trustworthiness management in the social internet of things [J ] . IEEE Transactions on Knowledge & Data Engineering , 2014 , 26 ( 5 ): 1253 - 1266 .
汤雅妃 , 张云勇 , 张尼 . 基于指纹识别的云安全认证技术 [J ] . 电信科学 , 2015 , 31 ( 8 ): 166 - 172 .
TANG Y F , ZHANG Y Y , ZHANG N . Cloud security certification technology based on fingerprint recognition [J ] . Telecommunications Science , 2015 , 31 ( 8 ): 166 - 172 .
沈士根 , 刘建华 , 曹奇英 . 博弈论与无线传感器网络安全 [M ] . 北京 : 清华大学出版社 , 2016 : 114 - 132 .
SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor networks security [M ] . Beijing : Tsinghua University PressPress , 2016 : 114 - 132 .
YANG X , HUANG X , LIU J K . Efficient handover authentication with user anonymity and untraceability for mobile cloud computing [J ] . Future Generation Computer Systems , 2015 , 62 ( C ): 190 - 195 .
ZOU Y , WANG G . Intercept behavior analysis of industrial wireless sensor networks in the presence of eavesdropping attack [J ] . IEEE Transactions on Industrial Informatics , 2016 , 12 ( 2 ): 780 - 787 .
0
浏览量
930
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构