Skip to main content

A high-assurance trust model for digital community control system based on internet of things


Security issues and Internet of Things (IoT) become indispensable part in digital community as IoT develops with the pervasive introduction of additional “smart” sensors and devices over the last decades, and it necessitates the implementation of information security principle in digital community system. A three-level criticality model to determine the potential impact is proposed in digital community system when various devices lost in this paper. Combining the actual security requirement of digital community and characteristics of IoT, a hierarchical security architecture including defense-in-deep cybersecurity and distribute secure control is proposed. A high-assurance trust model, which assumes insider compromise, which exists in the digital community, is finally proposed according to the security issues analysis.

This is a preview of subscription content, access via your institution.


  1. Australian Unity. Australian unity wellbeing index [EB/OL]. [2010-05-10].

  2. Gubbi J, Buyya R, Marusic S, et al. Internet of Things (IoT): A vision, architectural elements, and future directions [J]. Future Generation Computer Systems, 2013, 29(7): 1645–1660.

    Article  Google Scholar 

  3. Li S C, Li D X, Zhao S S. The internet of things: A survey [J]. Information Systems Frontiers, 2015, 17(2): 243–259.

    Article  Google Scholar 

  4. Federal Aviation Administration. Advisory circular AC: 25-11A[EB/OL]. [2007-06-21].

  5. Kopetz H. An integrated architecture for dependable embedded systems [C] // Proc 23rd IEEE International Symposium on Reliable Distributed System. Florianpolis: IEEE Press, 2004: 160–161.

    Google Scholar 

  6. Meserve J. Sources: Staged cyber attack reveals vulnerability in power grid [EB/OL]. [2007-09-26]. http://edition.

  7. Bush S F. Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid [M]. West Sussex: Wiley-IEEE Press, 2014.

    Book  Google Scholar 

  8. Andersson G, Donalek P, Farmer R, et al. Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance [J]. IEEE Transactions on Power Systems, 2005, 20(4): 1922–1928.

    Article  Google Scholar 

  9. Federal Energy Regulatory Commission. 2009 Report on enforcemen [EB/OL]. [2013-08-09]. http://ferclitigation. com/wp-content/uploads/0005-FERC-Preliminary-Findings-August-9-2013-2002899_1.pdf.

  10. Joseph H. Final Report on the August 14, 2003 blackout in the United States and Canada: Causes and Recommendations [EB/OL]. [2004-04-25].

  11. Abduvaliyev A, Pathan A K, Zhou J Y, et al. On the vital areas of intrusion detection systems in wireless sensor networks [J]. IEEE Communications Surveys and Tutorials, 2013, 5(3):1223–1237.

    Article  Google Scholar 

  12. Sundaramurthy S C, Bhatt S, Eisenbarth M R. Examining intrusion prevention system events from worldwide networks[C] // Proc BADGERS 12 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, New York: ACM Press, 2012:5–12.

    Google Scholar 

  13. Bessani A. From byzantine fault tolerance to intrusion tolerance [C] // Proc 5th Workshop on Recent Advances in Intrusion-Tolerant Systems, Hong Kong: IEEE Press, 2011: 15–18.

    Google Scholar 

  14. United States Department of Energy, Infrastructure security and energy restoration division [EB/OL]. [2007-09-27].

  15. Prajapati J K. Smart grid—A vision for the future[C] // Proc 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), Nagapattinam: IEEE Press, 2012: 672–677.

    Google Scholar 

Download references

Author information

Authors and Affiliations


Corresponding author

Correspondence to Jinsheng Xing.

Additional information

Foundation item: Supported by the National Science Foundation of China of Shanxi (2015011040).

Biography: LI Hongtao, male, Ph.D. candidate, research direction: network and information security.

Rights and permissions

Reprints and Permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, H., Xing, J. & Ma, J. A high-assurance trust model for digital community control system based on internet of things. Wuhan Univ. J. Nat. Sci. 21, 29–36 (2016).

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI:


CLC number