Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks

Social Peer-to-Peer (P2P) is a novel model to organize sensor networks, which can establish social relationships in an autonomous way with the benefits of extending the network boundaries and enhancing the network scalability. However, the complexity and time dependence characteristics introduced by social P2P model raise difficulties for assessing and selecting security services accurately and effectively in sensor networks. To address this, we propose a chance discovery based security service selection scheme for social P2P based sensor networks. We firstly establish the security assessment model for services in social P2P based sensor networks, regarding the security factors of exploitability, credibility, severity, confidentiality, integrality, availability and importance weight. More importantly, time dependence characteristics introduced by social P2P are considered during security assessment. Next, a security service selection scheme is proposed based on KeyGraph construction as well as the computation of its connection and tightness values. Finally, the service request forwarding model is established. The simulation results show the effectiveness and accuracy of the proposed security service selection scheme, which improves the feasibility and security of integrated sensor network and social networks.

[1]  Rosario Morello Use of TEDS to Improve Performances of Smart Biomedical Sensors and Instrumentation , 2015, IEEE Sensors Journal.

[2]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[3]  Mari Carmen Domingo A context-aware service architecture for the integration of body sensor networks and social networks through the IP multimedia subsystem , 2011, IEEE Communications Magazine.

[4]  Haiying Shen,et al.  An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System , 2015, IEEE Transactions on Computers.

[5]  Jianhua Li,et al.  Proposed Security Mechanism for XMPP-Based Communications of ISO/IEC/IEEE 21451 Sensor Networks , 2015, IEEE Sensors Journal.

[6]  Yukio Ohsawa,et al.  KeyGraph: automatic indexing by co-occurrence graph based on building construction metaphor , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.

[7]  Nicholas R. Jennings,et al.  Agent Technologies for Sensor Networks , 2009, IEEE Intelligent Systems.

[8]  Mianxiong Dong,et al.  Towards Fault-Tolerant Fine-Grained Data Access Control for Smart Grid , 2014, Wirel. Pers. Commun..

[9]  Zhidong Deng,et al.  INVITED PAPER Special Section on Concurrent System Technology and Its Application to Multiple Agent Systems Localization and Dynamic Tracking Using Wireless- networked Sensors and Multi-agent Technology: First Steps , 2002 .

[10]  Huansheng Ning,et al.  Future Internet of Things Architecture: Like Mankind Neural System or Social Organization Framework? , 2011, IEEE Communications Letters.

[11]  Chi Harold Liu,et al.  Sensor Search Techniques for Sensing as a Service Architecture for the Internet of Things , 2013, IEEE Sensors Journal.

[12]  Yuguang Fang,et al.  P2P-iSN: a peer-to-peer architecture for heterogeneous social networks , 2014, IEEE Network.

[13]  Vlad Trifa,et al.  Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services , 2010, IEEE Transactions on Services Computing.

[14]  Jang-Ho Choi,et al.  Distributed Coordination of IoT-Based Services by Using a Graph Coloring Algorithm , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference.