Trustworthy service composition with secure data transmission in sensor networks

As the basis of the Internet of Things (IoT), sensor networks have materialized its computation and communication capability into anything in our modern lives. Service composition provides us a promising way to cooperate various sensors to build more powerful IoT applications over sensor networks. However, the limited capability of sensor node poses great challenges not only to trustworthy service composition but also to secure data aggregation. The complex composite structure, computation-intensive evaluation, and massive data transmission become burdens for service composition in sensor networks. To overcome these issues, this paper proposes a distributed approach to enable efficient trustworthy service composition with secure data transmission in sensor networks. By analyzing dependency relationships, the rules for computing service trust and data trust are proposed based a multi-level trust model. Then, each target component service can be evaluated independently through a model checker. Moreover, an identity-based aggregate signature is introduced in the composite evaluation to guarantee the secure data transmission among different components. The experimental results show that our approach not only achieves efficient trustworthy service composition with complex invocation structures, but also reduces the costs in the secure data transmission.

[1]  Jianfeng Ma,et al.  Service Composition in Multi-domain Environment under Time Constraint , 2013, 2013 IEEE 20th International Conference on Web Services.

[2]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[3]  Ning Xi,et al.  Secure service composition with information flow control in service clouds , 2015, Future Gener. Comput. Syst..

[4]  Lei Li,et al.  Two-dimensional trust rating aggregations in service-oriented applications , 2011, IEEE Transactions on Services Computing.

[5]  Xiuzhen Zhang,et al.  A probabilistic method for emerging topic tracking in Microblog stream , 2016, World Wide Web.

[6]  Jianfeng Ma,et al.  Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments , 2013, 2013 IEEE 20th International Conference on Web Services.

[7]  Xiaohui Liang,et al.  SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[8]  Lei Li,et al.  Trust Evaluation in Composite Services Selection and Discovery , 2009, 2009 IEEE International Conference on Services Computing.

[9]  Yan Wang,et al.  Reputation-Oriented Trustworthy Computing in E-Commerce Environments , 2008, IEEE Internet Computing.

[10]  Shiyong Lu,et al.  Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines , 2007, Third IEEE International Conference on e-Science and Grid Computing (e-Science 2007).

[11]  Chunyan Miao,et al.  A Survey of Multi-Agent Trust Management Systems , 2013, IEEE Access.

[12]  Jianfeng Ma,et al.  A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.

[13]  Melanie Volkamer,et al.  Information Flow Control to Secure Dynamic Web Service Composition , 2006, SPC.

[14]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[15]  Peng Zhang,et al.  Novel silicon-controlled rectifier (SCR) for digital and high-voltage ESD power supply clamp , 2013, Science China Information Sciences.

[16]  Jianfeng Ma,et al.  Trust-based service composition in multi-domain environments under time constraint , 2014, Science China Information Sciences.

[17]  Gerard J. Holzmann,et al.  The Model Checker SPIN , 1997, IEEE Trans. Software Eng..

[18]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[19]  Jianfeng Ma,et al.  Efficient attribute based sequential aggregate signature for wireless sensor networks , 2014, Int. J. Sens. Networks.

[20]  Athman Bouguettaya,et al.  RATEWeb: Reputation Assessment for Trust Establishment among Web services , 2009, The VLDB Journal.

[21]  Jianfeng Ma,et al.  Trustworthy Service Composition in Service-Oriented Mobile Social Networks , 2014, 2014 IEEE International Conference on Web Services.

[22]  Rumen Kyusakov,et al.  Integration of Wireless Sensor and Actuator Nodes With IT Infrastructure Using Service-Oriented Architecture , 2013, IEEE Transactions on Industrial Informatics.

[23]  Eric M. Yeatman,et al.  Urban Sensor Data Streams: London 2013 , 2013, IEEE Internet Computing.

[24]  Gregor Snelting,et al.  Efficient path conditions in dependence graphs for software safety analysis , 2006, TSEM.

[25]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..