Trustworthy service composition with secure data transmission in sensor networks
- 329 Downloads
As the basis of the Internet of Things (IoT), sensor networks have materialized its computation and communication capability into anything in our modern lives. Service composition provides us a promising way to cooperate various sensors to build more powerful IoT applications over sensor networks. However, the limited capability of sensor node poses great challenges not only to trustworthy service composition but also to secure data aggregation. The complex composite structure, computation-intensive evaluation, and massive data transmission become burdens for service composition in sensor networks. To overcome these issues, this paper proposes a distributed approach to enable efficient trustworthy service composition with secure data transmission in sensor networks. By analyzing dependency relationships, the rules for computing service trust and data trust are proposed based a multi-level trust model. Then, each target component service can be evaluated independently through a model checker. Moreover, an identity-based aggregate signature is introduced in the composite evaluation to guarantee the secure data transmission among different components. The experimental results show that our approach not only achieves efficient trustworthy service composition with complex invocation structures, but also reduces the costs in the secure data transmission.
KeywordsService composition Data transmission Trust Security Sensor networks
We wish to thank the anonymous reviewers for their highly valuable and constructive comments. This paper is supported by the National Natural Science Foundation of China (No. 61602365, U1536202, 61571352, 61373173 and 61602364), the Open Fund of the Chinese Key Laboratory of the Grain Information Processing and Control (No. KFJJ-2015-202), and the Fundamental Research Funds for the Central Universities (No. XJS15075).
- 5.Hutter, D., Volkamer, M.: Information flow control to secure dynamic web service composition, pp 196–210. Springer Berlin Heidelberg, Berlin, Heidelberg (2006)Google Scholar
- 9.Liang, X., Li, X., Lu, R., Lin, X., Shen, X.: Seer: A secure and efficient service review system for service-oriented mobile social networks. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 647–656 (2012). doi: 10.1109/ICDCS.2012.46
- 17.Xi, N., Ma, J., Sun, C., Zhang, T.: Decentralized information flow verification framework for the service chain composition in mobile computing environments. In: 2013 IEEE 20th International Conference on Web Services (ICWS), pp. 563–570 (2013). doi: 10.1109/ICWS.2013.81
- 20.Yang, P., Yang, Z., Lu, S.: Formal modeling and analysis of scientific workflows using hierarchical state machines. In: IEEE International Conference on e-Science and Grid Computing. doi: 10.1109/E-SCIENCE.2007.35 (2007)
- 23.Zhang, T., Ma, J., Sun, C., Li, Q., Xi, N.: Service composition in multi-domain environment under time constraint. In: ICWS, pp. 227–234 (2013). doi: 10.1109/ICWS.2013.39
- 24.Zhang, T., Ma, J., Xi, N., Liu, X., Liu, Z., Xiong, J.: Trustworthy service composition in service-oriented mobile social networks. In: 2014 IEEE International Conference on Web Services (ICWS), pp. 684–687 (2014). doi: 10.1109/ICWS.2014.102