Loading…
A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things
Intelligent internet of things (IIoTs) have these features: heterogeneous network patterns, significant differences in devices, dynamic variability of network topologies, etc. In the complex security situation, it is necessary to reject data from untrusted devices to guarantee the security data trad...
Saved in:
Published in: | Wireless communications and mobile computing 2023, Vol.2023, p.1-16 |
---|---|
Main Authors: | , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c2092-4471f700d82f2d3e199841a5a84d75c66781f66ccd40328fcee983a7244b37873 |
container_end_page | 16 |
container_issue | |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2023 |
creator | Zhang, Yu Gong, Bei Wu, Yong Zheng, Guiping Diao, Zipeng |
description | Intelligent internet of things (IIoTs) have these features: heterogeneous network patterns, significant differences in devices, dynamic variability of network topologies, etc. In the complex security situation, it is necessary to reject data from untrusted devices to guarantee the security data trading of IIoTs. In this paper, we focus on the trustworthiness and authentication in a hybrid SDN scenario of IIoTs. For the process of the trusted judgment, we firstly implement the standardized model for the nodes with the device attributes, network states, and operation behaviors. Based on the standardized model, we propose feature evaluation functions in SDN and IP domains, respectively, to calculate the intradomain node trust values to achieve the trusted judgment. To consider the demand for secure data trading for cross-domain devices, we propose a remote data trading scheme in which the data transmitter signs the node identity and its trust value by a group signature and the data receiver verifies the signature. The group signature is not only to protect the privacy of the group members but also to support the dynamic accession and revocation of group members, so it is more suitable for IIoTs where the nodes frequently access/exit. The security is proved under the standard model. We conduct the simulation experiments to evaluate the correctness of the trusted judgment mechanism. The evaluation shows that the scheme has lower computational cost and the higher efficiency of the group signature scheme. |
doi_str_mv | 10.1155/2023/7463722 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2777922435</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2777922435</sourcerecordid><originalsourceid>FETCH-LOGICAL-c2092-4471f700d82f2d3e199841a5a84d75c66781f66ccd40328fcee983a7244b37873</originalsourceid><addsrcrecordid>eNp9kE1PAjEQhhujiYje_AFNPOpKv7bTPRJQISGaCJybsm1hCexiW2L49y5CPHqaN5NnZjIPQveUPFOa5z1GGO-BkBwYu0AdmnOSKQlw-ZdlcY1uYlwTQjhhtIPmfTwL-5icxZ9u2ySHhyaZtmdsVS_xtFy5rcNVjUeHRagsng7fsW8CHtfJbTbV0tXpN4faJdx4PFu1Y_EWXXmzie7uXLto_voyG4yyycfbeNCfZCUjBcuEAOqBEKuYZ5Y7WhRKUJMbJSzkpZSgqJeyLK0gnClfOlcoboAJseCggHfRw2nvLjRfexeTXjf7ULcnNQOAgjHB85Z6OlFlaGIMzutdqLYmHDQl-ihOH8Xps7gWfzzh7SvWfFf_0z_WAGo3</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2777922435</pqid></control><display><type>article</type><title>A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things</title><source>Wiley Online Library Open Access</source><source>Publicly Available Content Database</source><creator>Zhang, Yu ; Gong, Bei ; Wu, Yong ; Zheng, Guiping ; Diao, Zipeng</creator><contributor>Duan, Zhuojun ; Zhuojun Duan</contributor><creatorcontrib>Zhang, Yu ; Gong, Bei ; Wu, Yong ; Zheng, Guiping ; Diao, Zipeng ; Duan, Zhuojun ; Zhuojun Duan</creatorcontrib><description>Intelligent internet of things (IIoTs) have these features: heterogeneous network patterns, significant differences in devices, dynamic variability of network topologies, etc. In the complex security situation, it is necessary to reject data from untrusted devices to guarantee the security data trading of IIoTs. In this paper, we focus on the trustworthiness and authentication in a hybrid SDN scenario of IIoTs. For the process of the trusted judgment, we firstly implement the standardized model for the nodes with the device attributes, network states, and operation behaviors. Based on the standardized model, we propose feature evaluation functions in SDN and IP domains, respectively, to calculate the intradomain node trust values to achieve the trusted judgment. To consider the demand for secure data trading for cross-domain devices, we propose a remote data trading scheme in which the data transmitter signs the node identity and its trust value by a group signature and the data receiver verifies the signature. The group signature is not only to protect the privacy of the group members but also to support the dynamic accession and revocation of group members, so it is more suitable for IIoTs where the nodes frequently access/exit. The security is proved under the standard model. We conduct the simulation experiments to evaluate the correctness of the trusted judgment mechanism. The evaluation shows that the scheme has lower computational cost and the higher efficiency of the group signature scheme.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2023/7463722</identifier><language>eng</language><publisher>Oxford: Hindawi</publisher><subject>Cybersecurity ; Domains ; Electronic devices ; Energy consumption ; Hybrid systems ; Internet of Things ; Network topologies ; Nodes ; Trust ; Trustworthiness</subject><ispartof>Wireless communications and mobile computing, 2023, Vol.2023, p.1-16</ispartof><rights>Copyright © 2023 Yu Zhang et al.</rights><rights>Copyright © 2023 Yu Zhang et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c2092-4471f700d82f2d3e199841a5a84d75c66781f66ccd40328fcee983a7244b37873</cites><orcidid>0000-0003-2858-1356 ; 0000-0002-4432-3093</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2777922435/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2777922435?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4022,25752,27922,27923,27924,37011,44589,74897</link.rule.ids></links><search><contributor>Duan, Zhuojun</contributor><contributor>Zhuojun Duan</contributor><creatorcontrib>Zhang, Yu</creatorcontrib><creatorcontrib>Gong, Bei</creatorcontrib><creatorcontrib>Wu, Yong</creatorcontrib><creatorcontrib>Zheng, Guiping</creatorcontrib><creatorcontrib>Diao, Zipeng</creatorcontrib><title>A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things</title><title>Wireless communications and mobile computing</title><description>Intelligent internet of things (IIoTs) have these features: heterogeneous network patterns, significant differences in devices, dynamic variability of network topologies, etc. In the complex security situation, it is necessary to reject data from untrusted devices to guarantee the security data trading of IIoTs. In this paper, we focus on the trustworthiness and authentication in a hybrid SDN scenario of IIoTs. For the process of the trusted judgment, we firstly implement the standardized model for the nodes with the device attributes, network states, and operation behaviors. Based on the standardized model, we propose feature evaluation functions in SDN and IP domains, respectively, to calculate the intradomain node trust values to achieve the trusted judgment. To consider the demand for secure data trading for cross-domain devices, we propose a remote data trading scheme in which the data transmitter signs the node identity and its trust value by a group signature and the data receiver verifies the signature. The group signature is not only to protect the privacy of the group members but also to support the dynamic accession and revocation of group members, so it is more suitable for IIoTs where the nodes frequently access/exit. The security is proved under the standard model. We conduct the simulation experiments to evaluate the correctness of the trusted judgment mechanism. The evaluation shows that the scheme has lower computational cost and the higher efficiency of the group signature scheme.</description><subject>Cybersecurity</subject><subject>Domains</subject><subject>Electronic devices</subject><subject>Energy consumption</subject><subject>Hybrid systems</subject><subject>Internet of Things</subject><subject>Network topologies</subject><subject>Nodes</subject><subject>Trust</subject><subject>Trustworthiness</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp9kE1PAjEQhhujiYje_AFNPOpKv7bTPRJQISGaCJybsm1hCexiW2L49y5CPHqaN5NnZjIPQveUPFOa5z1GGO-BkBwYu0AdmnOSKQlw-ZdlcY1uYlwTQjhhtIPmfTwL-5icxZ9u2ySHhyaZtmdsVS_xtFy5rcNVjUeHRagsng7fsW8CHtfJbTbV0tXpN4faJdx4PFu1Y_EWXXmzie7uXLto_voyG4yyycfbeNCfZCUjBcuEAOqBEKuYZ5Y7WhRKUJMbJSzkpZSgqJeyLK0gnClfOlcoboAJseCggHfRw2nvLjRfexeTXjf7ULcnNQOAgjHB85Z6OlFlaGIMzutdqLYmHDQl-ihOH8Xps7gWfzzh7SvWfFf_0z_WAGo3</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Zhang, Yu</creator><creator>Gong, Bei</creator><creator>Wu, Yong</creator><creator>Zheng, Guiping</creator><creator>Diao, Zipeng</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-2858-1356</orcidid><orcidid>https://orcid.org/0000-0002-4432-3093</orcidid></search><sort><creationdate>2023</creationdate><title>A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things</title><author>Zhang, Yu ; Gong, Bei ; Wu, Yong ; Zheng, Guiping ; Diao, Zipeng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c2092-4471f700d82f2d3e199841a5a84d75c66781f66ccd40328fcee983a7244b37873</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cybersecurity</topic><topic>Domains</topic><topic>Electronic devices</topic><topic>Energy consumption</topic><topic>Hybrid systems</topic><topic>Internet of Things</topic><topic>Network topologies</topic><topic>Nodes</topic><topic>Trust</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhang, Yu</creatorcontrib><creatorcontrib>Gong, Bei</creatorcontrib><creatorcontrib>Wu, Yong</creatorcontrib><creatorcontrib>Zheng, Guiping</creatorcontrib><creatorcontrib>Diao, Zipeng</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhang, Yu</au><au>Gong, Bei</au><au>Wu, Yong</au><au>Zheng, Guiping</au><au>Diao, Zipeng</au><au>Duan, Zhuojun</au><au>Zhuojun Duan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2023</date><risdate>2023</risdate><volume>2023</volume><spage>1</spage><epage>16</epage><pages>1-16</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>Intelligent internet of things (IIoTs) have these features: heterogeneous network patterns, significant differences in devices, dynamic variability of network topologies, etc. In the complex security situation, it is necessary to reject data from untrusted devices to guarantee the security data trading of IIoTs. In this paper, we focus on the trustworthiness and authentication in a hybrid SDN scenario of IIoTs. For the process of the trusted judgment, we firstly implement the standardized model for the nodes with the device attributes, network states, and operation behaviors. Based on the standardized model, we propose feature evaluation functions in SDN and IP domains, respectively, to calculate the intradomain node trust values to achieve the trusted judgment. To consider the demand for secure data trading for cross-domain devices, we propose a remote data trading scheme in which the data transmitter signs the node identity and its trust value by a group signature and the data receiver verifies the signature. The group signature is not only to protect the privacy of the group members but also to support the dynamic accession and revocation of group members, so it is more suitable for IIoTs where the nodes frequently access/exit. The security is proved under the standard model. We conduct the simulation experiments to evaluate the correctness of the trusted judgment mechanism. The evaluation shows that the scheme has lower computational cost and the higher efficiency of the group signature scheme.</abstract><cop>Oxford</cop><pub>Hindawi</pub><doi>10.1155/2023/7463722</doi><tpages>16</tpages><orcidid>https://orcid.org/0000-0003-2858-1356</orcidid><orcidid>https://orcid.org/0000-0002-4432-3093</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2023, Vol.2023, p.1-16 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2777922435 |
source | Wiley Online Library Open Access; Publicly Available Content Database |
subjects | Cybersecurity Domains Electronic devices Energy consumption Hybrid systems Internet of Things Network topologies Nodes Trust Trustworthiness |
title | A Trusted Remote Data Trading Scheme in Hybrid SDN for Intelligent Internet of Things |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T20%3A30%3A10IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Trusted%20Remote%20Data%20Trading%20Scheme%20in%20Hybrid%20SDN%20for%20Intelligent%20Internet%20of%20Things&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Zhang,%20Yu&rft.date=2023&rft.volume=2023&rft.spage=1&rft.epage=16&rft.pages=1-16&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2023/7463722&rft_dat=%3Cproquest_cross%3E2777922435%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c2092-4471f700d82f2d3e199841a5a84d75c66781f66ccd40328fcee983a7244b37873%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2777922435&rft_id=info:pmid/&rfr_iscdi=true |