• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement

    2018-03-13 06:26:03BeiGongYuboWangXiangangLiuFazhiQiZhihuiSunFacultyofInformationTechnologyBeijingUniversityofTechnologyBeijing004ChinaChinaElectronicsStandardizationInstituteBeijing00007ChinaInstituteofHighEnergyPhysicsChineseAcademyofSc
    China Communications 2018年2期

    Bei Gong, Yubo Wang,*, Xiangang Liu, Fazhi Qi, Zhihui Sun Faculty of Information Technology, Beijing University of Technology, Beijing 004, China China Electronics Standardization Institute, Beijing 00007, China Institute of High Energy Physics, Chinese Academy of Sciences

    I. INTRODUCTION

    Internet of things makes that plenty of terminal entity in the physical world is connected to the sensing environment via the Internet, and the rise of the Internet of things make the long gap between the terminals and the Internet to become smaller. After the rise of the Internet,the Internet of things once again opened a new information technology revolution [1].Internet of things makes that interactive communication will no longer be controlled by people and the end, but it will also contain interaction and communication between things and things, people and things, things and people in each other. And this change also makes objects more intelligent and programmatic to complete the interactive communication between people and things, things and things and people interact with each other so that it can produce new implementation techniques and application scenarios [2], and further promote the fusion of man, nature and the social environment. From the inner demand and the external presentation form, the Internet of Things is the reality of the world in the information world. It can be regarded as a bridge between the real world and the virtual world through information technology and map people and things in the real world into cyberspace [3-4].

    Internet of Things has been widely used in industrial control, intelligent city, environmental protection and other areas [5-6]. In these areas, it is necessary to achieve Real-time feedback control based on the data collected by the sensing node, such as industrial control in the production line of field control, wisdom urban traffic, fire, water supply, power supply and gas related services, real-time monitoring of forest fire and so on. The premise of real-time feedback control is that the sensing node itself is trusted, otherwise the result of feedback control is unpredictable and will lead to catastrophic consequences. Therefore, it is necessary to confirm and track whether the sensing node is trusted, and it also needs to study the dynamic trusted metric mechanism and trusted attestation mechanism of the node.

    The trusted measurement study of internet of things sensing layer node will not only improve the safety of the Internet of things,but also reduce the overhead due to untrusted in preventing and monitoring. However, the research on the trusted measurement of the existing nodes in the sensing layer of the Internet is not satisfactory. First of all, the current research on trustworthiness measurement depends on the specific application scenario [7].It not only has poor universality, but also lack trusted measurement model for object-sensing nodes in the internet of things. In the literature[8], it is considered that the trusted operation of sensing nodes relies on the real-time monitoring and measurement of the state and behavior of these nodes. Therefore, the research of static and dynamic metrics mechanism for sensor nodes is the key to ensure the trusted operation of sensor nodes. In the literature[9], it is believed that the current credible measurement mechanism has the following challenges in the sensing layer: (1) limited node resources, (2) heterogeneous nodes, (3)lack of facility support, (4) fragile wireless channel. However, the trust mechanism of the Internet of things sensing layer nodes through the trusted metric is faced with some of the following challenges: (1) it cannot use a unified credible measurement mechanism due to heterogeneous environment, (2) sensing node deployment and application patterns make the traditional security policy ineffective, (3)different application scenarios make the interaction between nodes exist unknown mode.

    Therefore, in order to realize the real-time trusted monitoring and tracing of the sensing nodes, this paper proposes a trusted attestation mechanism of node based on dynamic metric.Firstly, a dynamic trusted metric model of sensing nodes is proposed, which quantifies reasonably the interaction between nodes,the behavior of nodes and the state of nodes.Finally, according to the characteristics of different sensing nodes, the overall prediction,feedback control and trusted measure can be dynamically applied to the sensing nodes, and the trusted value of the sensing nodes can be dynamically reflected. Then, on this basis, a revocable group signature mechanism of local verifier is proposed, which is used to complete the trusted proof of the node and prove the security of the mechanism under the standard model. The simulation results show that the trusted authentication mechanism proposed in this paper can effectively guarantee the trust of the node data transmission, realize the dynamic tracking of the node reliability, and have less impact on the system performance.The following sections are as follows: the second chapter introduces the related work and attestation process; the third chapter discusses the node dynamic trust measurement model;the fourth chapter talks about group signature mechanism and analysis the safety of it; the fifth chapter is the simulation experiment; the sixth chapter is the conclusion.

    II. RELATED WORK AND TRUSTED ATTESTATION PROCESS

    2.1 Related work

    2.1.1 Trusted measurement related

    research

    In the Internet of Things, most of the research is to establish a trusted measure model of the sensor nodes based on the state of the nodes and the evidence of the behavior. Literature[10] illustrates a trusted metric model based on the state of data transmission. The model focuses on the reliability of data transmission,but lacks a measurement of the trusted state of the source node and the destination node.In the literature [11] demonstrates a credible measurement model, which is applied to the vehicle network. The defense of the attack is realized mainly through the metric of the identity factor. The credibility measure of the model is subjective and is only used to measure the security state of the object reference.Literature [12] constructs a trust metric model that can perform dynamic detection of node behavior on the basis of witch attack detection. In the literature [13-15], the author makes a discussion on how to measure the trustworthiness of the Internet-aware nodes in the car network application scenarios, and discusses the trusted metric mechanism of the vehicle-aware nodes and the trusted group network mechanism of the sensing nodes, but applied to the car network in the credibility of the application mechanism is too narrow, universal poor. The literature [16] comprehensively discusses the trust research mechanism and the access control mechanism of the Internet of Things in the industrial Internet, and makes a detailed discussion on the real-time measurement and control of the sensing nodes in the industrial Internet. However, the industrial Internet application scene is only an application of the Internet of things scene. The real-time measurement and access control mechanism is too much pursuit of computing efficiency, and portability is poor. In [17], the author makes a discussion on the trusted measurement mechanism of the sensing node of the Internet of Things in the family pension, and focuses on ensuring the reliable operation and timely response of the sensing node. Literature [18]mainly discusses the trust measurement mechanism of the nodes in the medical and health field. The trusted measurement mechanism mainly realizes the real-time monitoring of the node based on the identity authentication and the access control mechanism, but the mechanism is too dependent on the hardware of the equipment and the application prospect is too narrow. Document [19] achieves a trusted measure of wearable devices based on the user’s biometrics, but the mechanism is only applicable to the field of wearable equipment.Literature [20] in Internet video monitoring application field puts forward a trusted measurement model which is suitable for video surveillance equipment. This mechanism can be applied to the intelligent camera, but this calculation process is too complicated, energy consumption is too high, resulting in a significant reduction in the credibility of the node measurement results.

    Literature [21] puts forward the multidimensional awareness node trust metric model,and the trust values of the measured nodes in this model contain three parts: supervisor trust, recommendation trust, and associated trust. The higher-level node that measures the node will query the node’s trusted recommendation to its neighbor node, and calculate the direct trust value of the node according to the node’s own state at the same time. Finally,the node trust value is calculated according to the association degree of the node. The model can effectively find malicious nodes, but the calculation process is too cumbersome, energy consumption is too high. Based on the cloud model, a trusted measurement model of the sensing node is proposed in the literature [22].The model can construct the measurement model according to the communication radius and the computational feature of the sensing node, which can effectively reflect the change characteristics of the node’s trusted degree,but the model needs to occupy a large number of communication channels and could significantly affect the normal data transmission. Literature [23] proposes a trust evaluation model based on node reputation, which is based on the Bayesian full probability model. However,the Bayesian full probability trust assessment process requires sufficient prior probabilities event, and the collection of the evidence is a very difficult process. In the literature [24],the trust metric model of sensing nodes is put forward from the perspective of game theory.The relationship between the interaction and trust between nodes is discussed from the countermeasure income model. However, the model is too concerned with the trust income and neglects the data transmission task of the sensing node, which leads to the disconnection from the practical application.

    2.1.2 Remote attestation research

    Remote attestation originated in TCG (Trusted Computing Group), which is the process of confirming the correctness of the information.By proving, the external validation entity can identify the protection capability, protection area and the source of the trust, and complete the identity of the platform authentication in the communication [25]. However, the remote attestation of TCG in the attestation process needs to provide the corresponding value in the platform configuration register,and it is easy to expose the platform configuration (such as the platform running software version, etc.), so that the platform is easily attacked by an intruder. At the same time, the measurement of the platform configuration is done at system startup. This attestation mode can only provide a static proof and cannot guarantee run-time integrity.

    In order to overcome the shortcomings of TCG remote attestation, a large number of hybrid remote attestation models have been proposed. Based on the language-based virtual machine technology, a remote attestation model with complex, dynamic, high-level program attributes and platform independence is proposed by combining the remote attestation and the virtual technology with the semantic remote attestation model [26]. However, the semantic remote attestation model can only prove the relative high-level application without monitoring the identity of the platform, so the behavior information and identity information is not bound, and the model does not reflect the platform identity.

    Another type of hybrid remote attestation model is a property-based remote attestation model [27-28] that passes the system configuration to a trusted third party (TTP), which is derived from TTP and issues the corresponding attribute certificate, so that the attribute certificate is sent to the verifier to prove the credibility of the platform when the authenticator needs to verify the platform trust. However, the mechanism requires TTP to generate the property certificate, thereby adding TTP to the TCB, increasing the complexity of the TCB. It is necessary to dynamically determine its corresponding attributes according to the system configuration, and how to support the attributes of the system without detailed description. The model can only verify the system configuration information and cannot reflect the dynamic behavior information of the system. Based on the RSA key system, the signature is relatively long and the computational complexity is high.

    Seshadri et al proposed a remote attestation for embedded devices without prerequisites for TPM [29]. After that, they also presented a remote code integrity verification solution in conjunction with legacy systems. Pioneer [30],which included a two-stage challenge-response protocol, but the model added a network delay Δtnetworkand network latency is difficult to predict due to various unknown reason, so it is difficult to actually run. Besides, the model does not have proof of identity verification,and it is vulnerable to posing as an attack.

    In recent years, some scholars have proposed a behavior-based remote attestation model [31-32]. The behavior-based remote attestation model defines a behavior measurement module to collect system-related behavior information and to verify the credibility of the system’s behavior history as a proof of the trust of the platform. But behavior-based teleworking uses a whitelist form in its trusted behavior anticipation strategy and requires that all actions be known, and in fact most of the behavior is unknown and that there are difculties in achieving it; and it is necessary to record the system behavior, increasing the overhead of the system and affecting the performance of the system.

    2.2 Trust attestation process description

    The trusted measurement model of nodes can calculate the trusted degree of node at any moment. The data transmission node needs to prove its own trust when transmitting data,which needs to send the information related to the node reliability to the remote node. The remote node inquires the node at the higher level of the node according to the information it receives whether it is an untrusted node, and decides whether to transfer data to the node based on the query results. The specific process is described as follows:

    1. The data sending node formats its own trust, timestamp and other attributes into a remote proof vector;

    2. The data sending node and its parent node complete the group signature of the remote proof vector (the group signature satises the revocable and forward security);

    Fig. 1. A remote attestation mechanism based on the trusted degree of the node.

    The proof mechanism has the characteristics of node measurable, monitorable and extensible, which can effectively conrm the data source and improve the usability of the system.

    As shown in Figure 1, the mechanism presented in this section first formats the proof data of the node into a remote proof vector and then select a revocable group signature mechanism. This mechanism can achieve the proof of security under the standard model and have the characteristics of no relevance back at the same time conform to the traceability,anonymity, some security requirements, such as correctness.

    The main research of remote attestation mechanism based on the trusted degree of the node includes: 1 Remote proof vector formatting, node external proof content is based on the third chapter of the credibility and node-related description to abstract, and it at least should contain node credibility, timestamp, node computing environment and other attributes; 2 Signature algorithm, the design of the revocation of the signature method is under the standard model. The method has node traceability, which can effectively protect the anonymity of the node security needs. The method also has high security and practicability, and satises the backward association,and the signature algorithm has better environmental adaptability; 3 It can be based on remote attestation results to trace and track the authenticity of the node in real time.

    III. THE DYNAMIC TRUSTED MEASURE MODEL OF SENSING NODE

    3.1 Formal description of sensing node

    According to computing power and energy,there are three types of nodes in a sensing network: ordinary nodes, cluster head nodes and data aggregation nodes. These three types of nodes assume different functions: ordinary nodes only collect and transmit data, cluster head nodes manage and measure ordinary nodes, and cluster head nodes also collect data from ordinary nodes and send data to data aggregation nodes, data aggregation nodes monitor all other nodes in a region and send data to the application layer of Internet of Things.According to the functions of different nodes,different nodes have different formal descriptions. The ordinary nodes should include the identity information, the computing environment and the data transmission status, so the formal description for the ordinary nodes can be described as follows:

    (1) Identification

    Node identifier contains two componentsidandpa,idincludes the network numberni, identity authentication keykand the permission informationpmandpais the physical address in sensing network, so node identifier can be formalized asID=(id,pa);

    (2) Computing environment

    The node computing environment contains hardware information and software information. Node computing environment can be formalized ashwis the hash value of the hardware information ,hois the hash value of OSloader,are the applications running on the nodes,are the protocols;

    (3) Data transfer status

    Ordinary nodes are only responsible for collecting and transmitting data, data transmission status includes the data that should be sent and the data that actually has been sent and timestamp. So, data transfer status can be formalized asdris the data that should be sent,dsis the data that actually has been sent,tbis the timestamp when data is sent,adis the destination address of data.

    According to the above description,is the formal description of the ordinary node. Cluster head nodes and data aggregation nodes also have the attributes as identification, computing environment and data transfer status. Unlike ordinary nodes,the cluster head nodes manage and measure the ordinary nodes and the data aggregation nodes manage and measure the cluster head nodes, so the data transfer status of Cluster head nodes and data aggregation nodes can be formalized as follows.

    (4) Data transfer status of cluster head node / data aggregation node:

    The data transmission status of the cluster node and data aggregation node has a similar formal description, it can be formalized by the following sequence:represents a cluster head node / data aggregation node requests the data that the ordinary nodes/ cluster head nodes should send,timestamp,dr,ds,tb,adare the same with Formal description of ordinary node.

    (5) The list of nodes maintained by cluster head nodes / data aggregation nodes

    Cluster head nodes / data aggregation nodes manage and measure ordinary nodes/ cluster head nodes, and each node maintains an ordinary node / cluster head node list, the list can be formalized asL=(N,T).N=(w1,w2. ......wn) represents ordinary nodes /cluster nodes (wirepresents the hardware, software configure and other information),T=(t1,t2 . ......tn) represents the trust of each node, so the formal description of the cluster head node / data aggregation is(ID,NE,Ds,L). represents the

    3.2 The trust measurement model for sensing nodes

    If a new sensing node begins to work, its parent node (parent node may be the cluster node or the data aggregation node) needs to confirm whether its initial state is trusted. Its initial state is trusted, it can collect and transmit data,and at this time the parent node needs to confirm whether the node is trusted during operation by the dynamic measurement. Section 3.3 will elaborate the initial status measurement of sensing nodes, and Section 3.4 will elaborate the dynamic trusted measurement of the sensing nodes.

    In the sensing layer, the measurement of the data aggregation node is achieved by the upper layer nodes. Therefore, this section discusses the trusted measurement process that the ordinary node and the cluster head node are regarded as measured nodes. Figure 2 describes the trusted metric fl ow of the nodes logically

    As shown in figure2, measured nodes arerstly achieved the initial state measurement,and then measured nodes will be dynamically measured (because the initial trusted state of nodes is not represent for trusted behavior of nodes, which needs comprehensive node dynamic state to judge whether the node is trusted). Then the superior nodes feedback control according to the measurement results of measured nodes.

    3.3 The initial state trust measurement for the sensing node

    Before the sensing nodes start to collect and transmit data, it is necessary to confirm whether the initial state of each sensing node is trusted, the initial state trust measurement of each sensing node needs to conrm that the hardware and software of the sensing node has not been tampered with.

    Fig. 2. The trust measurement fl ow for sensing nodes.

    According to the formal description of sensing nodes in section 3.1, compared with ordinary nodes, cluster head node computing ability is stronger, and it has higher energy. So the cluster head nodes manage and measure the ordinary nodes. Similar to the ordinary nodes, the data aggregation nodes manage and measure the cluster head nodes.Through the establishment of the trust chain from the ordinary node to the data aggregation node, it can ensure that the initial state of the sensing layer node is trusted. Givenis the hardware and software configuration information value of the sensing node, and the hash of hardware configuration ishw,the hash of osloader isol, the hash of operating system kernel isck, the expansion measurement hash of the applications in the node isGiven the expected measurement of hardware and software configuration information value stored in the upper node is

    and the upper node will computeIfVis equal to 0, the sensing node is not trusted,otherwiseISTis defined as the initial state measurement function:

    Given a threshold valueIt, ifIST>It, the sensing node can start to work.

    3.4 The dynamic trust measurement model for sensing nodes

    The sensing network of the Internet of Things includes data aggregation nodes, cluster head nodes and ordinary nodes. The dynamic measurement of these three types of nodes,monitoring the interaction between different nodes, measuring and analyzing the trusted measurement of the perceived network computing environment and the feedback control of the nodes are important prerequisite for ensuring the dynamic trusted operation of the perceived network. The main goal of modeling the dynamic trusted measurements of nodes is to quantify the interaction between different nodes, the behavior of the nodes and the state of the nodes. Finally, according to the relevant characteristics of different nodes, the overall trusted measurement, prediction and feedback control of nodes are achieved.

    In a given sensing network area, the sensing node of the region isBased on the formal description of the previous node,consists of three types of nodes: (1) ordinary perceived nodes,This type of nodes is responsible for collecting and transmitting data; (2) cluster head nodes,the type of nodes is responsible for managing the ordinary sensing node of its communication range and acts as a relay node for data transmission; (3) data aggregation nodes, this type of node is a bridge between the Internet and the sensing network, and is responsible for managing data aggregation nodes in the region.

    Definition 3-1Suppose that

    is the trusted measure function of cluster head nodeηπfor ordinary nodeηi, andis calculated as follows:

    According to Equation (2) represents the trusted measure ofηi, the trusted level ofηican be confirmed by the calculation result of Equation (2), the closer the trusted measure ofηiis close to 1, the higher the trusted level ofηπis, the higher the service priority within the communication radius ofηπ, which means the priority ofηπreceives and processes the data sent byηiis higher. The trusted measure ofηiis time-dependent, so it is necessary to mark the trusted measure ofηiwith the time stamp t.

    Definition 3-2According the calculation result ofktrusted levels can be determined,(There are three types of trustworthiness in this paper: untrustworthy, pending and trusted), supposeis a set of service levels ofηiwithin the communication radius ofηπ,then the service level function calculation process is described as follows:

    {sf1,sf2, .....,sfk} is determined by the actual need of perceived network, according to Equation (2) and Equation (3),ηπcan confirm the service level ofηiand thenηπclassifies the node service sequence within the communication radius according to node trusted, to make sure the data is trusted.

    3.5 The trust measurement function

    In order to achieve real-time feedback control of perceived nodes, the upper node of the sensing node needs to monitor the trusted state of its lower node in real time, so it is necessary to make real-time trusted metrics for perceived nodes. In order to be able to accurately reflect the real-time trusted state of the node,real-time trusted measure of perceived nodes from multiple dimensions is realized by sending behavior、trust risk and node validity to node data. The following is a detailed description of the node’s trusted measure function:

    Definition 3-3Perceived node data transmission state metric function

    The main task of a sensing node is to perceive and send data, so its data transmission status is an important indicator of whether its state is trusted, supposeηπrequiresηito send dr data packets in timeε,ηisent ds data packets actually(ds≤N ), Thenηπ’s calculated value forηi’s trusted in the data sending state at timeεis calculated as follows:

    The repetition rate of the packet sent by the sensing node is an important basis for judging whether the sensing network is trusted, assume that R is the repetition rate sent by the sensing node data packet, andθis the malicious node threshold, The closer theRis toθ, the more entrusted the node data transmission status is.The trusted rate of the perceived node data transmission status based on the data packet repetition rate can be described as follows:

    Whereλ>1,λθ=2,θis determined by the security policy of the perceived network.

    The data transmission delay is also an important indicator of whether the node data transmission status is trusted, supposetis the delay whenηisends data toηπ. Iftis less than the delay thresholdγspecified in the sensing network, the data transmission state ofηiis trusted. On the contrary, iftis more than the delay thresholdγ, the possibility thatηiis a malicious node increases. So, the trusted interval of the sensing node data transmission state based on the data transmission delay can be described as follows:

    Whereρa(bǔ)ndγθis determined by the security policy of the perceived network.

    Equation 4 to Equation 6 is a trusted measure of the state of data transmission for a time atηitime, in order to calculate the trusted state ofηi’s data transmission status more comprehensive and accurately, need to take a comprehensive look, at a period of time,ηi’s data transmission status. Assume inTwtime,ηπrequests n times to send data to nodeηi,Assume that the measure of the state of the n times data transmissions fromηπtoηiissupposeDt1 is the oldest measure of the past,Dtnis the measure of the current data transmission status, thencan be described as follow:

    f(i) is the time decay function,f(i)∈[0,1],f(i) can smooth data which at different time by sending State trusted measure. As trust falls over time, the closer the metric to the current moment is, the higher the weight. The time decay function reflects the characteristics of the trust age lag. The time decay function can be described as follows:

    The data transmission behavior trusted computing function proposed in this section based on the time attenuation function has the following advantages:

    By introducing the time function, the data transmission state trusted measurement function proposed in this paper has the following advantages:

    (1) The time decay function accurately reflects the characteristics of trust over time,making the calculation of the trusted level of data transmission state more accurate and close to reality;

    (2) the introduction of the time recession function can reflect the influence of the historical confidence level of the node on the current confidence level, which can be used to calculate the confidence level of the nodes from a broader and more equitable perspective.

    Risk and trust are interdependent, and trusting an entity is necessarily associated with the risk of failure of trust. Therefore, for the risk behind the perceived node’s trusted value, this paper solves the risk benefit theory in economic theory. According to the value of the functionthe risk function of the node’s trusted measurement value is described as follows:

    Definition 3-4formula (9) is used to describe the influence of the uncertainty of the data transmission state on the trusted of nodes.Due to the uncertainty of data transmission status, the effect of risk on the transmission state of data of nodes is shown below:

    Definition 3-5If the set of nodes that have interacted withηiisReferring to the trust model in human relations,to assess whether a person is trusted, it not only needs to assess whether his own behavior is trusted, but also needs to refer to the trust of their interpersonal counterparts. The confidence level of people whose communicative object is highly trusted and whose communication object is obviously different. Similarly,the trusted measurement valveηiis also affected by its surrounding interaction nodes, so the interactive confidence measure ofηican be described as follow:

    υ(αrj) is the interactive trusted factor function ofηi, and the analytic expression ofυ(αrj) is as follows:

    From (12), ifηrjandηibelong to the same cluster, then the number of hops is 1, so; Otherwise,the number of hops is larger than 1, thenAt this time,υ(ηrj) is obtained by multiplying the data transmission state confidence metric of each relay node in the calculation communication path. Similar to the trust in human relations, as for direct interaction and after a number of relay interactions, the trust value is obviously different.(11)describes the influence of the communication distance and the number of relay objects on the trusted value of the node interaction,clearly reflects the effect of the distance and the number of interacting objects on the reciprocal confidence measurement ofηi.

    Definition3-6,with the increasing application of Internet of Things, the attack on nodes in the perceived layer is endless, and the trusted operation of the sensing nodes is closely related to the trust of the nodes. Therefore, this paper acts the perceived nodes trusted measure as an important component of node confidence measurement, the evaluation function of the trust of nodes is described as follows:Logthe number of data transmission or interaction failures ofηiin theηπrecord,ηπenergize the nodes according to the trusted evaluation ofηi.The higher the trust ofηiis,the more trustedηiis respectively.

    Definition 3-7Node activity degree is used to characterize the stability of running state of nodes in the perceived network. The more interactive objectsηihas, the more the number of successful interactions is and the more

    In view of the lack of global perspective of the traditional trusted measurement model, the use of simple mean method and direct value method can determine the trusted measured value, which could lead to a comprehensive consideration of various factors on the effect of the value of the trusted measurement. The trusted measurement value does not smoothly display the change in the confidence metric.

    In order to more accurately reflect the change of the trustworthy measure of the node and to smooth the influence of each factor on the confidence measure of the node, this paper introduces the information entropy to smooth the measure of different dimensions, and the confidence level of the node is more realistic.

    Definition 3-8According to Din the definition 3-3 - Definition 3-7, the information entropy calculation process for theidimension ofηiis described as follows:

    Definition 3-9Given differentMi(ηπ,ηi),Assumingβiis the confidence distinction ofthen the calculation ofαican be described as follows:

    Given a differentiated degree of confidence,a different metric dimension weight can be obtained:

    In equation (16),Mis the number of stages of rating given in definition 3-1. According to the formula above, obviously: 0≤β≤1iandat the same time, the weight ofcan be obtained according to the equation (16) and the equation (17). If the value ofinformation entropy is less thanρ, it will determine thatβiis 0. And the according to the equation (17), its classification weight is 0. This can effectively reduce the risk of perceived networks and improve the perceived network operation of its trust.So, the overall trustworthy measure of the node can be calculated according to Denition 3-1-Denition 3-9:

    3.6 The feedback control of sensing nodes

    According to (18), whenηπcalculates the dynamic confidence measure ofηiwhich namedperforms feedback control onηiaccording to different value ofTM(ηπ,ηi,t) forηito ensure that the operation of the cluster with the core ofηπis trusted

    The measurement model of this paper is a step-by-step process. After the initial state measurement, the trusted measurement process of the sensor nodes is taken into account in the different clusters. The trusted measure of the cluster head node is completed by the data aggregation node, and its processing method is similar to that of the ordinary node receiving the measure of the cluster head node. In the previous section, the dynamic measure of a node is a trusted measure of the value at any time, and since any node is trusted, it is necessary to judge it with its historical confidence measure. So, we can give the calculation of the trusted value of the node within a period of time

    According to the formula (3-20), we can give the denition of a trusted node:

    Definition 3-10For any sensing node, if the node is calculatedfrom a trusted value withintime period,meetsthis the trusted threshold specied by the sensing network, then the node is trusted.

    Whether the node is trusted is determined by its superior node, if a trusted value calculated by a node in time [ti,ti+1] is lower than the trusted thresholdxed by the sensing network,the parent node further examines its trusted value at [ti-1,ti]. If the value ofVT(ti-1,ti)is not trusted as well, it will then reject the node. If the value ofVT(ti-1,ti) is trusted, the parent node further examines its trusted value at [ti+1,ti+2], thereby determining whether or not to exclude the node from the perceived network.

    IV. DESCRIPTION OF THE SIGNATURE PROCESS

    In order to describe the specific process of signature, therst step is to give the format of the remote attestation vector of node. Remote attestation vectors include trustworthiness,timestamps, node computing environments,and other attributes, which can be formally described asnode’s trusted measure,Tris the time window when proong,NEis the node computing environment, andARis the node’s other related attributes. Figure 3 describes the signature vector format:

    4.1 Prerequisites

    Fig. 3. Remote attestation vector format diagram.

    GroupG1 and groupG2 is a multiplicative cyclic group of two ordersn=pq, p and q are large generous, and the generator of the groupG1 isg. The mappingset, which is the bilinear mappings of groupsG1 toG2 that satisfies both of the following properties:

    (1) Computable bilinear: there is a computable mappingsalso a cyclic group of order) that all exists

    (2) Non-degenerative: the generating elementgon the groupis the unit of the groupG1.

    Define 4-2 Subgroup Decision Hypothesis

    If the subgroup decision problem cannot be solved within the probability polynomial time,then the problem is a subgroup decision problem on the groupG.

    Define 4-3 l-HSDH assumptions

    If there is no probability polynomial algorithm within timetto deal with the probleml-HSDHwith the least probabilityt, then the assumption (l,ε,t)-HSDHbased on the groupGpset up.

    4.2 Signature process

    1. Key generation phase

    Select a multiplication cycle groupG1 of multiplication cyclen=pq(p,qis a large prime. The generator isgandf() is defined as a mapping function of groupandis the combined order of the bilinear mapping. Assumes thatGpis the subgroup ofG1, which has the generator isg1 and the order isq. The superior node (the node for the group administrator) that needs to do the external proof selectand calculateI=e(g,g)x,J=gy.The group administrator selectsγ,δaccording to the attribute of its own node, and calculates the time windowaccording to the current timeti.The subordinate node of the group administrator calculates the trustworthinessvalue of the nodeαi.Select the trusted nodeα1,α2 ,.....,αmas a group signature member,calculateand then calculateω1,ω2,.......,ωm∈Gwhereωi=f(IDi) andIDiis the identity ofαi.The group public key isand the group administrator’s private key isAfter the group administrator selectsαid∈RZnfor their each group members and calculatesskid= (gx/(y+αid),gαid,γαid)∈G13, the next stage is to calculate the trusted valueof each nodeαi. If the result is untrusted, then it needs to calculateand the group administrator will put the group members ofinto the untrusted listUIL.

    2. Signing Process

    Given a timestampTr, the signed message isNEandARwith the string concatenation symbol isand calculateThen selectcalculatethen calculateandThe final output of the signature is

    (2) This step is query whether the untrusted queryUILexiststhat makes the formhold. If the form holds, then that node is regarded as not trusted. Otherwise the node is viewed as trusted.

    3. Signature Verification

    (1) When the remote questioner re-and then verifies whetherandholds. If not, signature refused could be executed, otherwise it cannot transfer to step 2.

    (2) This step is to query whether or notis present in the query untrusted listcan hold. If the form holds, then node is not regarded as trusted. Otherwise the node is view as trusted.

    4.3 Program security analysis

    Theorem 4-1the program in this section satisfies the correctness of the signature.

    Proof: For any group members, the legitimate signature has the ability to verify:

    Theorem 4-2For attackerAwith any probability polynomial computing power, the real computing environment and the simulated computing environment are indistinguishable for the attackerAat a given timet'. Assuming thatAdv(A) is the probability advantage that the attacker can solve the anonymity in the real environment andAdv(A,S) is the probability advantage of the attacker that solves the anonymity in the simulation environment, andεsis the probability that the attacker resolves the subgroup judgment, then

    Proof:Suppose there is an algorithm B that can simulate the interaction between the challenger and the attacker to deal with subgroup decision problems. After the algorithmit needs to judgewhich one holds. The algorithmBfirst generates a public key based on the key generation method of the signature mechanism in this section, and then sends the group public key to the attackerA. In this case, regardless ofwhich one holds, because the algorithmBknows the group administrator’s private key, so the algorithmBcan answer all queries. And whenholds, the simulation environment is the same as the real computing environment.Given a signature momentTr*, the attackerAchooses a signature message and two signature identities. The attackerAdoes not query the corresponding signature key between group of membersin thethe untrusted list, and the signatures of the members of the group. The algorithmBselectsand outputs signaturethen sendsto the attackerA. Assumptions that the attackerAcan guess the identity of the signer, then the algorithmBsends 1, otherwise the algorithmBsends 0. Suppose thatAdv(B) represents that the algorithmBis used to solve the problem of subgroup decision, then the following relationship holds:

    In summary, in the sub-group decision hypothesis, the actual computing environment and the hypothetical computing environment for the attacker from the probability is indivisible.

    Theorem 4-3For any attacker, there exits an equationAdv(A,S)=0

    Proof:Ifholds, then the attacker cannot calculate the signature key and identity of the signer according to challenge signatures. Althoughαidmay be used to answerthis means that the challenge signature and signer’s identity are statistically independent of each other.

    Based on the above calculation results, it is proved that the identity of the signer cannot be deduced fromc1', and for the attackerAc1 andc1' satisfy:

    (1)

    Based on the above calculation results, it is proved that the identity of the signer cannot be deduced fromc2', and for the attackerAc2 andc2' satisfy:

    From the above calculation results,can be obtained. Although the simulation algorithm usingaidgenerates a challenge signature, the identity information and the private key of the signer cannot be calculated according to the challenge signature. Therefore,the probability that the attackerAcan calculate the identity of the signer in the simulation environment can be negligible. So theorem 4-7 can be obtained according to theorem 4-5 and theorem 4-6.

    Theorem 4-4In a given timet, if there is no probability polynomial computing ability of the attackerAwho can deal with subgroup decision problems at least the radio ofεs,then for anyt'≈ttime , the attackerAcan solve the anonymity of the probability advantageAdv(A)< 2εs.

    Thus, according to theorem 4-5 to theorem 4-7, this mechanism satisfies the anonymity of signature

    Theorem 4-5The traceability theorem.If there is an attacker whose computational power is a probability polynomial, the attacker succeeds in breaking the traceability of the group signature within the given timet' at the probabilityε, then there is a timet' thatt'≈tcould hold. The probability that the attackerAcan break the double signature isε.

    Proof:Because group signature can be regarded as a special case of double signature from mathematic point of view, on the basis of double signature, the non-zero interaction method is used to realize the anonymity and non-linkage of group signature. The use of unforgeable two-layer signature can achieve the characteristics of group signature tracking in this section.

    If the challenger is imitated by the algorithmB, for example, the algorithmBand the attackerAinteract with each other to forge the signature, then the algorithm can do the following operation:

    First, the algorithmBis used to set the system parameters of the double-layer signature, and the common parameters that generate the signature are made public. The attackerAqueries the signature private key of the group signature member from the algorithmB. The algorithmBadds the signature member to the algorithm in the process of double-layer signature. The signed private key of the group signaturecan be obtained, then transmittingto the attackerA.The attackerAqueries the algorithmBfor the untrusted flag of the signed member at the time stampTr.The algorithmBcalculatesthe attackerA.The attackerAqueries the algorithmBfor the group signature of the signature member message for message M. The algorithmBqueries the signature language of the double signature and obtainsThe algorithmBrandomly generatesand calculates the group signatureaccording to the generation algorithm of the group signature, which is obviously a useful group signature. AttackerAcan use the group public key and the list of untrusted nodes to verify whether the signature is valid.

    So:

    Verifyingc2*can get:

    Therefore, according to above calculation process, the follows can be got.

    Table I. The parameters of experimental simulation.

    Fig. 4. The distribution of sensing nodes.

    Fig. 5. The rate of trusted data in the first malicious nodes rate is 30%.

    V. EXPERIMENTAL SIMULATION AND QUALITATIVE COMPARISON

    5.1 Experimental simulation

    This section uses NS2 to simulate the process of the remote attestation and the attack behavior on the platform of Ubuntu. It can verify the validity of the mechanism which is proposed in this paper. In this section, the experimental range is 200m * 200m and the coordinate of the base station is (85, 84). This experiment randomly places 50 nodes in the selected range. The communication radius of cluster head nodes is 300m and the communication radius of ordinary nodes is 150m. The physical parameters of this simulation have been shown in Table 1. The distribution of nodes in sensing network is shown in Figure 4.

    In the simulation of this experimental, it mainly studies two kinds of malicious nodes.The first malicious nodes will maliciously discard the data packets in the transmission and the second malicious nodes will send a large number of data packets which are erroneous,obsolete and unrelated, such as the flood attack. According to the test of nodes radio in different types, the trusted rate of data reception of this mechanism has been proposed in this experimental. In different rate of malicious nodes, the trusted value of data which is received from nodes has been shown from Figure 5 to Figure 7. In those figures, Mechanism 1 presented in literature [31] refers to the mechanism transmits data with traditional remote attestation and Mechanism 2 presented in literature [33] refers to the mechanism with traditional attestation of sensing nodes. The experimental results are as follows:

    According to these figures, when the first and the second malicious nodes rate are 30%,the trusted rate of data can be guaranteed effectively with the remote attestation mechanism of nodes in this section. It is due to the trust of nodes has been confirmed before the data transmission and the trust of nodes will be confirmed again according to the time window after the data reception in the mechanism which is proposed in this section.

    Although the energy consumption of the mechanism which is proposed in this section is higher than the Mechanism 1 and Mechanism 2 in Figure 8, considering the balance of safety and energy consumption, the computational complexity of the mechanism which is proposed in this section is higher than Mechanism 1 and Mechanism 2 and the energy consumption compared with the Mechanism 1 and Mechanism 2 in unit time increased less than 3%. Therefore, the mechanism which is proposed in this section will not affect the service life of sensing nodes obviously.

    5.2 Qualitative comparison of trust measurement model in this paper and other models

    This paper proposes a trusted measurement model for the sensing nodes in the Internet of Things. In order to realize the real-time measurement of the trust of nodes in different dimensions, this model is based on the initial state measurement of nodes, and takes the trust measurement of data transmission behaviors of nodes as the core. Also, this model combines the risk assessment with the trust calculating method in sociology. In order to realize the real-time tracking and feedback of the trusted state of nodes, the model is based on the trusted values of nodes and proposes a measurement method combining active measurement and passive measurement in different dimensions. The method determines the trusted degree of nodes which have historical trusted value from the vertical time dimension,and the misjudgment rate is low.

    Fig. 6. The rate of trusted data in the second malicious nodes rate is 30%.

    Fig. 7. The rate of trusted data in the first and the second malicious nodes mixed rate is 30%.

    Table 2 qualitatively compares the measurement model of sensing nodes proposed by this paper in Internet of Things with other trusted models in Internet of Things. Although this model presented by this paper has low misjudgment rates, it has variety of obvious merits. For example, compared with other models in internet of things, this model could resist a wide range of risks, such as such as Sybil attacks, Physical capture attacks, Clone node attacks, Forged identity attacks, Route attack, Dos attacks. Besides, it has some specific characteristics of active measurement,dynamic measurement and real-time feedback.Therefore, this model enjoys enormous potential and vast development prospects, and some specific measures need to be taken to make a dramatic difference. The metric function needs to be further optimized to reduce misjudgment rates and this model applied in engineering area should also be promoted in some aspects.

    Fig. 8. The residual rate of nodes energy.

    VI. CONCLUSION

    According to the sensing nodes of Internet of Things need real-time trace its trusted value in some application scenes, this paper proposes a trusted attestation mechanism which is based on the dynamic measurement for sensing nodes of Internet of Things and proposes a dynamic trusted measurement model of sensing nodes that quantify the interaction between different nodes, the behavior of nodes and the state of nodes. This paper realizes the dynamic trusted measurement and feedback control of sensing nodes with the characteristic of different nodes. This paper uses many attribute computing functions, such as the direct trusted measurement function, the trusted risk assessment function, the feedback control function,the data behavior sending function and the sensing nodes activity function, to realize the dynamic trusted measurement of sensing nodes from several dimensions and show the real-time change of the trusted measurement value of sensing nodes. Through the calculation of trusted measurement value in the vertical time dimension, this paper can find the malicious nodes effectively and realize the feedback control of sensing nodes. Meanwhile, on the basis of this, the local verifier revocation group signature which is provable security realizes the trusted attestation of nodes in the standard model and this mechanism can real-time trace the trusted measurement value of nodes in data transmission. This mechanism realizes the dynamic tracing of trusted measurement value of nodes and proof the security of this mechanism in standard model. Through the simulation experimental, this mechanism can defense kinds of attacks to sensing nodes and effectively guarantee the trust of data transmission between nodes and realize the real-time tracing of sensing nodes.

    This work was supported by the National Natural Science Foundation of China (The key trusted running technologies for the sensing nodes in Internet of things: 61501007,The research of the trusted and security environment for high energy physics scientific computing system: 11675199). General Project of science and technology project of Beijing Municipal Education Commission:KM201610005023, the outstanding personnel training program of Beijing municipal Party Committee Organization Department(The Research of Trusted Computing environment for Internet of things in Smart City:2014000020124G041). The key technology research and validation issue for the emergency treatment telemedicine public service platform which integrates the military and civilian and bases on the broadband wireless networks(No.2013ZX03006001-005), the issue belongs to Major national science and technology projects

    Table II. Comparison of trust measurement model in this paper and other models.

    [1] ROMANA R, ZHOUA J, LOPEZB J, “On the features and challenges of security & privacy in distributed Internet of Things”[J].Computer Networks, vol. 57, no. 10, 2013, pp. 2266-2279.

    [2] Gongyi Wu, Ying Wu, Introduction to Internet of things Engineering[M], Machinery Industry Press, 2012.

    [3] Z.H Qian, Y.J Wang, “Research on Internet of Things Technology and Application”[J],Journal of Electronics, vol. 40, no. 5, 2012, pp. 1023-1029.

    [4] Chun-Wei Tsai, Chin-Feng Lai, Athanasios V.Vasilakos, “Future Internet of Things: open issues and challenges”[J],Wireless Networks, vol.20, no. 8, 2014, pp. 2201-2217.

    [5] Dhananjay S, Gaurav T, Jara AJ, “A survey of Internet-of-things: Future vision, architecture,challenges and services”[C],In: Proc. of the 2014 IEEE World Forum on Internet of Things (WFIOT). IEEE, 2014, pp. 287-292.

    [6] Perera C, Zaslavsky A, Liu CH, Compton M,Christen P, Georgakopoulos D, “Sensor search techniques for sensing as a service architecture for the Internet of things”,IEEE Sensors Journal,vol. 14, no. 2, 2014, pp. 406-420.

    [7] Theodorakopoulos G, Baras J S, “On trust models and trust evaluation metrics for ad hoc networks”[J],IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, 2006, pp. 318-328.

    [8] Mengmeng Sun, Yuanan Liu, Kaiming Liu, “Security analysis and security mechanism research in Internet of things”[J],Confidential Science and Technology, vol. 21, no. 3, 2011, pp. 61-66.

    [9] Jing Sun, Xiujuan Sun, HuiqunZhao, Ka Wang,“Research on trusted mechanism in Internet of things”[C],Proc. The 14th Chinese Fault Tolerant Computing Conference, 2011, pp. 1-10.

    [10] Zhang C, Lin X, Lu R, Ho P, RAISE, “An Efficient RSU-aided MessageAuthentication Mechanism in Vehicular Communication Network”s[C],Proc.Communications Society, 2008, pp. 1451-1457.

    [11] Aijaz A, Bochow B, Dotzer F, Festag A, Gerlach M, Kroh R, LeinmullerT, “Attacks on Inter Vehicle Communication Systems - an Analysis”[C],Proc.in 3rd International Workshop on Intelligent Transportation, 2006, pp. 2-16.

    [12] Guette G, Ducourthial B, “On the Sybil attack detection in VANET”[C],Proc. 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems IEEE, 2007, pp. 1-6.

    [13] Gerlach M, Trust for vehicular applications,“Autonomous Decentralized Systems”[C],Proc.2007. ISADS’07. Eighth International Symposium,2007, pp. 295-304.

    [14] Cencioni P and Pietro R D, VIPER, “A vehicle-to-infrastructure communication privacy enforcement protocol”[C],Proc. Mobile Adhocand Sensor Systems, 2008, pp. 1-6.

    [15] Choi J Y, Jakobsson M, Wetzel S, “Balancing auditability and privacy in vehicular networks”[C],Proc. Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks - Q2SWinet’05,2005, pp. 79.

    [16] C. Lesjak, D. Hein and J. Winter, “Hardware-security technologies for industrial IoT: TrustZone and security controller”,Proc. IECON 2015- 41st Annual Conference of the IEEE Industrial Electronics Society, Yokohama, 2015, pp.002589-002595.

    [17] H. Dagale et al., “CyPhyS+: A Reliable and Managed Cyber-Physical System for Old-Age Home Healthcare over a 6LoWPAN Using Wearable Motes”,Proc. 2015 IEEE International Conference on Services Computing, 2015, pp. 309-316.

    [18] A. Rghioui, A. L’aarje, F. Elouaai and M. Bouhorma, “The Internet of Things for healthcare monitoring: Security review and proposed solution,”Proc. 2014 Third IEEE International Colloquium in Information Science and Technology (CIST),2014, pp. 384-389.

    [19] M. Sarvabhatla, M. Giri and C. S. Vorugunti,“Cryptanalysis of “a biometric-based user authentication mechanism for heterogeneous wireless sensor networks”,Proc. 2014 Seventh International Conference on ContemporaryComputing (IC3), 2014, pp. 312-317.

    [20] K. Ntalianis and N. Tsapatsoulis, “Remote Authentication via Biometrics: A Robust Video-Object Steganographic Mechanism Over Wireless Networks, ”Proc. in IEEE Transactions on Emerging Topics in Computing, 2016, pp. 156-174.

    [21] Y. Ren and A. Bonkerche. “Performance analysis of trust-based node evaluation mechanisms in wireless and mobile ad hoc networks”.In Proc,of the 2009 IEEE International Conference on Communications (ICC 2009), 2009, pp. 535-5539.

    [22] S.B Cai, Q.L Han, Z.G Gao, D.S Yang, J. Zhao.“Research on Cloud Trust Model for Malicious Node Detection in Wireless Sensor NetWork”,Journal of Electronics, vol. 40, no. 11, 2012, pp.2232-2238.

    [23] S. Ganeriwal, L. K. Balzano and M. B. Srivastava,“Reputation-based framework for high integrity sensor networks”,Proc. ACM Transactions on Sensor Networks (TOSN), 2016 , pp. 15-19.

    [24] C. Kamhoua, N. Pissinou and K. Maldd, “Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy”.In Proc. of the 2011 IEEE International Conference on Communications (ICC 2011), 2011, pp. 1-6.

    [25] Trusted Computing Group [EB/OL]. https://www.trustedcoinputinggroup.org. Nov, 2011.

    [26] Haldar, V., D. Chandra and M. Franz, “Semantic Remote Attestation – Virtual Machine Directed Approach to Trusted Computing”, in: Proceedings of the 3rd VirtualMachine Research and Technology Symposium, San Jose, 2004, pp. 6-7.

    [27] Sadeghi, A.-R. and C.StUble, “Property-based attestation for computing platforms:caring about properties, not mechanisms in:C.Hempelmann and V. Raskin”,Proc.Proceedings of the New Security Paradigms Workshop 2004,Nova Scotia, 2004, pp. 67-77.

    [28] Liqun Chen, “A Protocol for Property Based Attestation”,Proc. STC, 06, Alexandria, Virginia,2006, pp. 7-16.

    [29] Seshadri A, Luk M, Perrig A, L van Doom, P.Khosla, “Externally Verifiable Code Execution”[J].Communications of the ACM, vol. 49, no. 9,2006, pp. 45-49.

    [30] Poritz J, Schunter M, Van Herreweghen E etc. Property attestation scalable and privacy-friendly security assessment of peer computers [R]. New York: IBM, 2004.

    [31] TAN Liang CHEN Ju. “Remote Attestation Project of the Running Environment of the Trusted Terminal” [J].Journal of Software, vol. 25, no. 6,2014, pp. 1273-1290.

    [32] Korthaus R, Sadeghi A R, Stüble C etc. “A practical property-based bootstrap architecture”[C].Proc. ACM. In Proceedings of the 2009 ACM workshop on Scalable trusted computing, 2009,pp. 29-38.

    [33] P. Gasti, J. ?eděnka, Q. Yang, G. Zhou and K. S.Balagani, “Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones, ”Proc. in IEEE Transactions on Information Forensics and Security, 2016, pp. 2556-2571.

    [34] I.-R. Chen and J. Guo, “Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection, ”Proc. in 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, 2014, pp. 49-56.

    [35] D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X.Wang, “TRM-IoT: A trust management model based on fuzzy reputation for internet of things,”Comput. Sci. Inf. Syst., vol. 8, no. 4, 2011, pp.1207-1228.

    [36] A. F. Skarmeta, J. L. Hernandez-Ramos, and M. V.Moreno, “A decentralized approach for security and privacy challenges in the Internet of Things,”Proc. in 2014 IEEE World Forum on Internet of Things, 2014, pp. 67-72.

    [37] G. Schryen, M. Volkamer, S. Ries, and S. M. Habib,“A Formal Approach Towards Measuring Trust in Distributed Systems, ”Proc. Acm Symposium on Applied Computing, 2011, pp. 1739-1745.

    [38] M. Anuar, M. Isa, N. N. Mohamed, H. Hashim,S. Farid, S. Adnan, J. A. Manan, and R. Mahmod,“A Lightweight and Secure TFTP Protocol for Smart Environment, ”Proc. IEEE Symposium on Computer Applications & Industrial Electronics,2012, pp. 302–306.

    [39] A. Mana, H. Koshutanski, and E. J. Perez, “A trust negotiation based security framework for service provisioning in load-balancing clusters, ”Comput. Secur., vol. 1, no. Elsevier, 2011, pp. 4–25.

    [40] W. U. Qiu-xin, “Secure solution of trusted Internet of things base on TCM, ”J. China Univ., vol.20, no. 12, 2013, pp. 47–53.

    [41] X. Xu, N. Bessis, and J. Cao, “An Autonomic Agent Trust Model for IoT systems, ”Procedia Computer Science,vol. 21, no.11, 2013, pp. 107–113

    [42] Y. Ben, A. Olivereau, D. Zeghlache, and M. Laurent, “Trust management system design for the Internet of Things: A contextaware and multiservice approach, ”Comput. Secur., vol. 39, no.11, 2013, pp. 351–365.

    欧美日韩在线观看h| 国产精品熟女久久久久浪| 欧美一区二区亚洲| 一级黄片播放器| 精品亚洲成国产av| 国产爽快片一区二区三区| 99久久精品国产国产毛片| 亚洲天堂av无毛| 一区二区三区精品91| 午夜福利网站1000一区二区三区| 精品视频人人做人人爽| 毛片女人毛片| 男女免费视频国产| 久久精品国产a三级三级三级| 久久国内精品自在自线图片| 日日摸夜夜添夜夜爱| 久久精品国产鲁丝片午夜精品| 一级毛片 在线播放| 亚洲伊人久久精品综合| 精品人妻视频免费看| 国产永久视频网站| 国产成人精品久久久久久| 欧美日韩综合久久久久久| 国产在线视频一区二区| 91狼人影院| 十八禁网站网址无遮挡 | 免费观看无遮挡的男女| 美女视频免费永久观看网站| 亚洲性久久影院| 日日啪夜夜撸| 国产视频首页在线观看| 97精品久久久久久久久久精品| 久久久久久人妻| 国产探花极品一区二区| 日本av免费视频播放| 精品久久久久久电影网| 久久久a久久爽久久v久久| 日韩中文字幕视频在线看片 | 一级av片app| 亚洲丝袜综合中文字幕| 人人妻人人澡人人爽人人夜夜| 国产成人精品福利久久| 国产成人精品一,二区| 免费黄频网站在线观看国产| 丝瓜视频免费看黄片| 亚洲综合精品二区| 亚洲成人手机| 噜噜噜噜噜久久久久久91| 天堂8中文在线网| 午夜福利影视在线免费观看| 国产精品久久久久久久久免| 免费人成在线观看视频色| 插逼视频在线观看| 男人舔奶头视频| 最近最新中文字幕免费大全7| 国产av国产精品国产| 老司机影院成人| 国产深夜福利视频在线观看| 亚洲最大成人中文| 亚洲精品亚洲一区二区| 日韩制服骚丝袜av| 丰满迷人的少妇在线观看| 日本一二三区视频观看| 18禁动态无遮挡网站| 久久久久久人妻| 久久精品国产亚洲网站| 日韩 亚洲 欧美在线| 国产视频内射| 欧美日韩亚洲高清精品| 又爽又黄a免费视频| 精品亚洲成a人片在线观看 | 黑人高潮一二区| 高清av免费在线| 免费大片18禁| 国产成人a∨麻豆精品| 国产精品久久久久久精品电影小说 | 在线观看人妻少妇| 高清午夜精品一区二区三区| 大码成人一级视频| 久久久久国产精品人妻一区二区| 国产日韩欧美亚洲二区| 亚洲av日韩在线播放| 麻豆国产97在线/欧美| 亚洲精品第二区| 国产av一区二区精品久久 | 亚洲欧美日韩另类电影网站 | 欧美精品国产亚洲| 亚洲欧美一区二区三区国产| 91精品一卡2卡3卡4卡| 亚洲av中文av极速乱| 久久久久人妻精品一区果冻| 蜜桃亚洲精品一区二区三区| 黄色配什么色好看| 日本vs欧美在线观看视频 | 精品亚洲成a人片在线观看 | 国产久久久一区二区三区| 99精国产麻豆久久婷婷| 亚洲国产欧美人成| 久热久热在线精品观看| 插逼视频在线观看| 精品一区在线观看国产| 男人狂女人下面高潮的视频| 色综合色国产| 少妇人妻 视频| 国语对白做爰xxxⅹ性视频网站| 精品亚洲成国产av| 国产极品天堂在线| 青青草视频在线视频观看| 国产精品久久久久久精品古装| 亚洲无线观看免费| 欧美xxⅹ黑人| 亚洲av欧美aⅴ国产| 午夜福利高清视频| 黄片无遮挡物在线观看| 国产成人91sexporn| 亚洲av福利一区| 色视频在线一区二区三区| 最后的刺客免费高清国语| 99热这里只有是精品在线观看| 国产乱来视频区| 亚洲av成人精品一区久久| 另类亚洲欧美激情| 精品熟女少妇av免费看| 精品人妻偷拍中文字幕| 最近最新中文字幕免费大全7| 嫩草影院新地址| 久久精品夜色国产| 男人添女人高潮全过程视频| 成人亚洲精品一区在线观看 | av播播在线观看一区| 精华霜和精华液先用哪个| 少妇人妻一区二区三区视频| www.色视频.com| 国产男人的电影天堂91| 精品人妻熟女av久视频| 欧美日韩亚洲高清精品| 成年女人在线观看亚洲视频| 亚洲成人av在线免费| 国产 一区精品| 国产精品人妻久久久影院| 在线观看免费高清a一片| 国产精品熟女久久久久浪| 中文字幕制服av| 高清视频免费观看一区二区| 国产免费一级a男人的天堂| 国产一区亚洲一区在线观看| 91精品伊人久久大香线蕉| 又黄又爽又刺激的免费视频.| 亚洲精品乱码久久久久久按摩| 欧美一区二区亚洲| 精品久久久噜噜| 亚洲av中文av极速乱| 国精品久久久久久国模美| av在线app专区| 永久免费av网站大全| 国产高清国产精品国产三级 | 十分钟在线观看高清视频www | 亚洲精品456在线播放app| 久久女婷五月综合色啪小说| 国产高清国产精品国产三级 | 少妇的逼好多水| 美女高潮的动态| 国产在线免费精品| 国产男女内射视频| 国产91av在线免费观看| 两个人的视频大全免费| 欧美一区二区亚洲| 亚洲人成网站高清观看| 91aial.com中文字幕在线观看| 欧美xxxx黑人xx丫x性爽| 欧美97在线视频| 国产极品天堂在线| av不卡在线播放| 97超碰精品成人国产| 久久精品国产自在天天线| 最后的刺客免费高清国语| 国产午夜精品一二区理论片| 成人国产麻豆网| 下体分泌物呈黄色| 亚洲av二区三区四区| 精品午夜福利在线看| 99热全是精品| 日本-黄色视频高清免费观看| 我要看日韩黄色一级片| 夜夜爽夜夜爽视频| 久久精品国产自在天天线| 久久久色成人| 亚洲av二区三区四区| 国产亚洲午夜精品一区二区久久| 高清毛片免费看| 午夜福利高清视频| 亚洲综合精品二区| 人妻制服诱惑在线中文字幕| 精品一区在线观看国产| 国产成人a区在线观看| 蜜臀久久99精品久久宅男| 大片免费播放器 马上看| 99久久精品一区二区三区| 一区在线观看完整版| 亚洲欧美清纯卡通| 国产在线视频一区二区| 丰满乱子伦码专区| videos熟女内射| 日韩av在线免费看完整版不卡| 亚洲色图综合在线观看| 欧美97在线视频| av国产免费在线观看| 色婷婷久久久亚洲欧美| 黑丝袜美女国产一区| 亚洲国产欧美人成| 亚洲人成网站高清观看| 日本wwww免费看| 久久久久国产精品人妻一区二区| 一级毛片黄色毛片免费观看视频| 一二三四中文在线观看免费高清| 国产成人午夜福利电影在线观看| 最近最新中文字幕免费大全7| 久久99热6这里只有精品| 亚洲成人av在线免费| 欧美 日韩 精品 国产| 身体一侧抽搐| av国产久精品久网站免费入址| 成人午夜精彩视频在线观看| 国产精品av视频在线免费观看| 少妇人妻精品综合一区二区| 亚洲国产高清在线一区二区三| 91久久精品国产一区二区三区| 97在线人人人人妻| 在线观看免费日韩欧美大片 | 嫩草影院入口| 国产在线视频一区二区| 中国国产av一级| 少妇精品久久久久久久| 亚洲美女视频黄频| 极品教师在线视频| 日本与韩国留学比较| 亚洲欧美清纯卡通| 亚洲av二区三区四区| 噜噜噜噜噜久久久久久91| 丝袜喷水一区| 日韩不卡一区二区三区视频在线| 国产中年淑女户外野战色| 国产黄片美女视频| 超碰av人人做人人爽久久| 夜夜爽夜夜爽视频| 18禁裸乳无遮挡动漫免费视频| 久久精品久久久久久久性| 亚洲av日韩在线播放| 久久精品久久精品一区二区三区| 久久久欧美国产精品| 亚洲国产精品专区欧美| 特大巨黑吊av在线直播| 日韩人妻高清精品专区| 亚洲国产最新在线播放| 大香蕉久久网| 国产亚洲最大av| av黄色大香蕉| 久久精品国产自在天天线| 久久精品夜色国产| 久久国产精品大桥未久av | 亚洲精品第二区| 肉色欧美久久久久久久蜜桃| 天天躁日日操中文字幕| 大香蕉久久网| 免费观看性生交大片5| 亚洲丝袜综合中文字幕| 在线观看三级黄色| 涩涩av久久男人的天堂| 日本午夜av视频| a 毛片基地| 夫妻性生交免费视频一级片| 亚洲欧美日韩卡通动漫| 伦精品一区二区三区| 精品久久国产蜜桃| 久久久久久久久久久丰满| 国产精品偷伦视频观看了| 亚洲国产精品成人久久小说| 寂寞人妻少妇视频99o| 久久国产亚洲av麻豆专区| 中国美白少妇内射xxxbb| 亚洲国产欧美在线一区| 老师上课跳d突然被开到最大视频| 精华霜和精华液先用哪个| 秋霞在线观看毛片| 亚洲av国产av综合av卡| 国产 精品1| 国产有黄有色有爽视频| 亚洲aⅴ乱码一区二区在线播放| 久久亚洲国产成人精品v| 一边亲一边摸免费视频| 美女中出高潮动态图| 国产精品秋霞免费鲁丝片| 亚洲精品456在线播放app| 久久久午夜欧美精品| 热99国产精品久久久久久7| 性高湖久久久久久久久免费观看| 久久青草综合色| 日日摸夜夜添夜夜添av毛片| 久久人人爽人人爽人人片va| tube8黄色片| 精品国产乱码久久久久久小说| 久久99热6这里只有精品| 久久热精品热| 亚洲av免费高清在线观看| 国产男女超爽视频在线观看| 91精品伊人久久大香线蕉| 精品少妇黑人巨大在线播放| 观看美女的网站| 日韩在线高清观看一区二区三区| 男女边吃奶边做爰视频| 联通29元200g的流量卡| 高清日韩中文字幕在线| 高清在线视频一区二区三区| 美女国产视频在线观看| videos熟女内射| 国产伦精品一区二区三区视频9| 国产精品久久久久久久久免| 观看av在线不卡| 国产乱来视频区| 日韩一本色道免费dvd| 在线 av 中文字幕| 大话2 男鬼变身卡| 精品一区二区三区视频在线| 中文天堂在线官网| 男人和女人高潮做爰伦理| 熟女电影av网| 亚洲va在线va天堂va国产| 三级经典国产精品| 欧美xxxx黑人xx丫x性爽| 五月开心婷婷网| 亚洲色图综合在线观看| 色综合色国产| av卡一久久| 亚洲国产日韩一区二区| 久久国产亚洲av麻豆专区| 成人高潮视频无遮挡免费网站| 天堂8中文在线网| 中国美白少妇内射xxxbb| 国产精品爽爽va在线观看网站| 男女无遮挡免费网站观看| 亚洲国产欧美在线一区| 成人一区二区视频在线观看| 多毛熟女@视频| 一级毛片aaaaaa免费看小| 中文精品一卡2卡3卡4更新| 又黄又爽又刺激的免费视频.| 日日撸夜夜添| 国产一区有黄有色的免费视频| 日韩制服骚丝袜av| 在线观看人妻少妇| 亚洲av福利一区| 亚洲第一av免费看| 精品午夜福利在线看| 国产成人a区在线观看| 亚洲精品色激情综合| 国产色爽女视频免费观看| 99久久中文字幕三级久久日本| 97在线人人人人妻| 高清日韩中文字幕在线| 亚洲第一av免费看| 男女边吃奶边做爰视频| 亚洲欧美成人精品一区二区| 我要看日韩黄色一级片| 在线精品无人区一区二区三 | 肉色欧美久久久久久久蜜桃| 99久久精品国产国产毛片| 日本免费在线观看一区| 中文字幕精品免费在线观看视频 | 建设人人有责人人尽责人人享有的 | 啦啦啦在线观看免费高清www| 成人美女网站在线观看视频| 国产亚洲欧美精品永久| 中文字幕久久专区| 亚洲欧洲日产国产| 尾随美女入室| 激情 狠狠 欧美| 91精品一卡2卡3卡4卡| 亚洲av电影在线观看一区二区三区| 欧美高清成人免费视频www| 舔av片在线| 亚洲无线观看免费| 亚洲欧美日韩卡通动漫| 国产高清不卡午夜福利| 国产在视频线精品| 中文天堂在线官网| a级毛色黄片| 91aial.com中文字幕在线观看| 亚洲成人一二三区av| 一区在线观看完整版| 中文字幕制服av| 亚洲欧美成人综合另类久久久| 99久久人妻综合| 高清日韩中文字幕在线| 男女无遮挡免费网站观看| 色哟哟·www| 免费人成在线观看视频色| 欧美国产精品一级二级三级 | 欧美一区二区亚洲| videossex国产| 国产伦理片在线播放av一区| 亚洲精品乱久久久久久| 在现免费观看毛片| 女性生殖器流出的白浆| 国产精品欧美亚洲77777| 国产日韩欧美亚洲二区| 国产一区二区在线观看日韩| 国产 精品1| 大陆偷拍与自拍| 精品久久国产蜜桃| 女的被弄到高潮叫床怎么办| 国产永久视频网站| 18禁裸乳无遮挡免费网站照片| 亚洲av中文字字幕乱码综合| 最黄视频免费看| 99热6这里只有精品| 免费观看av网站的网址| av在线播放精品| 亚洲精品一二三| 国产亚洲91精品色在线| 久久精品国产鲁丝片午夜精品| 成人黄色视频免费在线看| 亚洲欧美中文字幕日韩二区| 99视频精品全部免费 在线| 亚洲欧美日韩卡通动漫| 国产精品不卡视频一区二区| xxx大片免费视频| 高清毛片免费看| 成人黄色视频免费在线看| 最近2019中文字幕mv第一页| 国产成人精品久久久久久| 国产免费一区二区三区四区乱码| 国产探花极品一区二区| 一级二级三级毛片免费看| 精品视频人人做人人爽| 七月丁香在线播放| 成人综合一区亚洲| 搡老乐熟女国产| 亚洲国产日韩一区二区| 春色校园在线视频观看| 午夜日本视频在线| 欧美3d第一页| 亚洲欧洲国产日韩| 国产精品麻豆人妻色哟哟久久| 国产亚洲欧美精品永久| 亚洲丝袜综合中文字幕| 观看美女的网站| 黄色日韩在线| 简卡轻食公司| 亚洲精品日韩av片在线观看| videos熟女内射| 一级a做视频免费观看| 日韩在线高清观看一区二区三区| 国产免费视频播放在线视频| 在线看a的网站| 国产精品国产三级国产专区5o| 精品久久久久久久久亚洲| 亚洲人成网站在线播| 国产成人91sexporn| 精品视频人人做人人爽| 黄色怎么调成土黄色| 久久久久久久久久久免费av| av卡一久久| 亚洲av日韩在线播放| 久久精品国产亚洲网站| 成人黄色视频免费在线看| 蜜桃久久精品国产亚洲av| 日韩伦理黄色片| 97在线人人人人妻| 成人特级av手机在线观看| 亚洲欧美日韩东京热| 久久久精品94久久精品| 亚洲美女视频黄频| 啦啦啦啦在线视频资源| 伦理电影大哥的女人| 亚洲av.av天堂| 亚洲美女搞黄在线观看| 婷婷色综合大香蕉| 国产人妻一区二区三区在| 亚洲在久久综合| 噜噜噜噜噜久久久久久91| 大又大粗又爽又黄少妇毛片口| 天天躁夜夜躁狠狠久久av| 最近手机中文字幕大全| 性高湖久久久久久久久免费观看| 免费观看性生交大片5| 伊人久久精品亚洲午夜| 深爱激情五月婷婷| kizo精华| 高清av免费在线| 精品一品国产午夜福利视频| 自拍欧美九色日韩亚洲蝌蚪91 | 国产日韩欧美亚洲二区| 99热国产这里只有精品6| 纯流量卡能插随身wifi吗| 哪个播放器可以免费观看大片| 男人狂女人下面高潮的视频| 日本色播在线视频| 国产无遮挡羞羞视频在线观看| 免费高清在线观看视频在线观看| 日韩一区二区三区影片| 亚洲真实伦在线观看| 国产精品一二三区在线看| 亚洲精品,欧美精品| 国产无遮挡羞羞视频在线观看| 只有这里有精品99| 黄色视频在线播放观看不卡| 日韩一本色道免费dvd| 一级黄片播放器| 在线观看免费日韩欧美大片 | 亚洲av电影在线观看一区二区三区| 97超碰精品成人国产| 99九九线精品视频在线观看视频| 91狼人影院| 久久精品久久精品一区二区三区| 女性生殖器流出的白浆| 精品久久久精品久久久| 色网站视频免费| 在现免费观看毛片| 久久精品国产亚洲av涩爱| 亚洲色图综合在线观看| 久久女婷五月综合色啪小说| av国产久精品久网站免费入址| 免费av不卡在线播放| 国模一区二区三区四区视频| 99视频精品全部免费 在线| 插阴视频在线观看视频| av.在线天堂| 国产淫片久久久久久久久| 国产永久视频网站| 亚洲欧美日韩另类电影网站 | 精品少妇久久久久久888优播| 久久久久国产网址| 免费观看无遮挡的男女| .国产精品久久| 亚洲欧美日韩另类电影网站 | av在线播放精品| 伦理电影大哥的女人| 亚洲国产最新在线播放| 亚洲第一区二区三区不卡| 日本欧美国产在线视频| 午夜福利在线观看免费完整高清在| 色婷婷久久久亚洲欧美| 久久人妻熟女aⅴ| 欧美日韩综合久久久久久| 亚洲真实伦在线观看| 精品亚洲成a人片在线观看 | 成人亚洲精品一区在线观看 | 亚洲av日韩在线播放| 干丝袜人妻中文字幕| 十分钟在线观看高清视频www | 一级毛片黄色毛片免费观看视频| 啦啦啦啦在线视频资源| 日韩精品有码人妻一区| 免费看不卡的av| 18禁在线无遮挡免费观看视频| 国产永久视频网站| 国产乱人偷精品视频| 欧美性感艳星| 你懂的网址亚洲精品在线观看| 国产精品久久久久久精品古装| 中文精品一卡2卡3卡4更新| 大香蕉久久网| 一级黄片播放器| 成人国产av品久久久| 国产高清有码在线观看视频| 午夜福利高清视频| 高清在线视频一区二区三区| 超碰av人人做人人爽久久| 大话2 男鬼变身卡| 内地一区二区视频在线| 国产亚洲欧美精品永久| 久久女婷五月综合色啪小说| 青春草国产在线视频| 精品国产一区二区三区久久久樱花 | 久久这里有精品视频免费| 大片免费播放器 马上看| 只有这里有精品99| 夜夜爽夜夜爽视频| 天天躁日日操中文字幕| 久久99精品国语久久久| 成人综合一区亚洲| 欧美成人a在线观看| 久久99精品国语久久久| 国产色婷婷99| 欧美成人a在线观看| 在线观看免费日韩欧美大片 | 国产大屁股一区二区在线视频| 人人妻人人添人人爽欧美一区卜 | 午夜福利影视在线免费观看| 亚洲精品日韩av片在线观看| 久热这里只有精品99| 亚洲va在线va天堂va国产| 日本午夜av视频| 亚洲人成网站在线观看播放| 日本一二三区视频观看| 男女下面进入的视频免费午夜| 97超碰精品成人国产| 色婷婷久久久亚洲欧美| 国产伦精品一区二区三区视频9| 91狼人影院| 国产人妻一区二区三区在| 日日撸夜夜添| 免费大片黄手机在线观看| 亚洲欧美一区二区三区国产| 亚洲精品乱久久久久久| 亚洲中文av在线| 国产美女午夜福利| 国产一区二区三区av在线| 中文在线观看免费www的网站| 久久久精品94久久精品| 黄色一级大片看看| 国产老妇伦熟女老妇高清| 成人亚洲欧美一区二区av| 精品久久久久久久久av| 欧美人与善性xxx|