Skip to main content
Log in

Security authentication technology based on dynamic Bayesian network in Internet of Things

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the rapid development of the Internet of Things (IoT) technology in the information society, how to meet the urgent requirements of current users for trusted transmission services is a research hot-spots in the field of the IoT industry. In view of the research status on security authentication in IoT, a security authentication technology based on dynamic Bayesian network combined with trusted protocol is proposed in this paper. Through the introduction of the trusted measurement and the combined public key-based security authentication mechanism in the network, it enhances the security information exchange and considers the node credibility and the path reliability in the routing decision so as to choose a high secure and trusted path for information transmission in IoT. The evaluation results showed that our algorithm achieves a much better security performance than comparison algorithms in overhead and computational complexity for real time applications. In addition, our algorithm has also an adaptive capability and can quickly react to the denial of the service attack, which effectively suppress the threat of abnormal entity in the IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Ammireddy A (2017) Method and system for efficient graceful restart in an open shortest path first (Open_SPF) network

  • Aris A, Oktug SF, Yalcin SBO (2015) Internet-of-Things security: denial of service attacks, pp 903–906

  • Bamasag O, Toumi KY (2016) Efficient multicast authentication in Internet of Things. In: International conference on information and communication technology convergence. IEEE, Piscataway, pp 429–435

    Google Scholar 

  • Chang KD, Chen JL (2012) A survey of trust management in WSNS, Internet of Things and future Internet. KSII Trans Internet Inf Syst 6(1):5–23

    Google Scholar 

  • Gang G, Lu Z, Jiang J (2011) Internet of Things security analysis. In: International conference on internet technology and applications. IEEE, Piscataway, pp 1–4

    Google Scholar 

  • Gong B, Zhang Y, Wang Y (2017) A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener Comput Syst 78:867–886

    Article  Google Scholar 

  • Gong B, Wang Y, Liu X et al (2018) A trusted attestation mechanism for the sensing nodes of Internet of Things based on dynamic trusted measurement. China Commun 15(2):100–121

    Article  Google Scholar 

  • Griffin PH (1992) Security for ambient assisted living: multi-factor authentication in the Internet of Things. In: IEEE GLOBECOM workshops. IEEE, Piscataway, pp 1–5

    Google Scholar 

  • Kothmayr T, Schmitt C, Hu W et al (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Netw 11(8):2710–2723

    Article  Google Scholar 

  • Ma Z, Wang Z, Liang D et al (2017) A model of trusted measurement model, p 04023

  • Ndibanje B, Lee HJ, Lee SG (2014) Security analysis and improvements of authentication and access control in the Internet of Things. Sensors 14(8):14786–14805

    Article  Google Scholar 

  • Park N, Kang N (2015) Mutual authentication scheme in secure Internet of Things technology for comfortable lifestyle. Sensors 16(1):20

    Article  Google Scholar 

  • Rauter T, Iber J, Kreiner C (2016) Thingtegrity: a scalable trusted computing architecture for the Internet of Things. In: International conference on embedded wireless systems and networks. Junction Publishing, Toronto, pp 23–34

    Google Scholar 

  • Sun X, Wang C (2011) The research of security technology in the Internet of Things. In: Advances in computer science, intelligent system and environment. DBLP, pp 113–119

  • Sun K, Quan LI, Xiaofeng XU et al (2017) Risk analysis on human factors in operation of high risk construction based on dynamic Bayesian network. J Hydroelectr Eng 36(5):28–35

    Google Scholar 

  • Tamboli MB, Dambawade D (2017) Secure and efficient CoAP based authentication and access control for Internet of Things (IoT). In: IEEE international conference on recent trends in electronics, information and communication technology. IEEE, Piscataway, pp 1245–1250

    Google Scholar 

  • Teng M, Li B, Zhai N (2017) Study on data security protection technology in Internet of Things. China Comput Commun

  • Wang L, Liu F (2018) A trusted measurement model based on dynamic policy and privacy protection in IaaS security domain. EURASIP J Inf Secur 2018(1):1

    Article  Google Scholar 

  • Wang L, Jiang S, Guo Y (2012) Composable-secure authentication protocol for mobile sensors roaming in the Internet of Things. Sci Sin 42(7):815

    Article  Google Scholar 

  • Wang J, Fan K, Mo W et al (2016) A method for information security risk assessment based on the dynamic Bayesian network. In: International conference on networking and network applications. IEEE, Piscataway, pp 279–283

    Google Scholar 

  • Wu F, Xu L, Kumari S et al (2017) A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J Ambient Intell Humaniz Comput 8(1):101–116

    Article  Google Scholar 

  • Xiao Q, Liu S (2017) Motion retrieval based on dynamic bayesian network and canonical time warping. Soft Comput 2:1–14

    Google Scholar 

  • Zhang Q, Feng D, Zhao S (2016) Research of platform identity attestation based on trusted chip. J Commun 35(8):95–106

    Google Scholar 

  • Zhao YL (2013) Research on data security technology in Internet of Things. Appl Mech Mater 433–435:1752–1755

    Google Scholar 

  • Ziegeldorf JH, Shafagh H, Raza S et al (2013) Towards viable certificate-based authentication for the internet of things. In: ACM workshop on hot topics on wireless network security and privacy. ACM, New York, pp 37–42

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qing Zhang.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Q., Xu, D. Security authentication technology based on dynamic Bayesian network in Internet of Things. J Ambient Intell Human Comput 11, 573–580 (2020). https://doi.org/10.1007/s12652-018-0949-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-0949-2

Keywords

Navigation