A high-assurance trust model for digital community control system based on internet of things
详细信息    查看全文
  • 作者:Hongtao Li ; Jinsheng Xing ; Jianfeng Ma
  • 关键词:digital community ; Internet of Things(IoT) ; information security ; security architecture ; secure control ; TP 309.2
  • 刊名:Wuhan University Journal of Natural Sciences
  • 出版年:2016
  • 出版时间:February 2016
  • 年:2016
  • 卷:21
  • 期:1
  • 页码:29-36
  • 全文大小:459 KB
  • 参考文献:[1]Australian Unity. Australian unity wellbeing index [EB/OL]. [2010-05-10]. http://www.australianunitycorporate.com.au/community/auwi/Pages/default.aspx.
    [2]Gubbi J, Buyya R, Marusic S, et al. Internet of Things (IoT): A vision, architectural elements, and future directions [J]. Future Generation Computer Systems, 2013, 29(7): 1645–1660.CrossRef
    [3]Li S C, Li D X, Zhao S S. The internet of things: A survey [J]. Information Systems Frontiers, 2015, 17(2): 243–259.CrossRef
    [4]Federal Aviation Administration. Advisory circular AC: 25-11A[EB/OL]. [2007-06-21]. http://www.faa.gov/documentLibrary/media/Advisory_Circular/AC25.1435-1.pdf.
    [5]Kopetz H. An integrated architecture for dependable embedded systems [C] // Proc 23rd IEEE International Symposium on Reliable Distributed System. Florianpolis: IEEE Press, 2004: 160–161.
    [6]Meserve J. Sources: Staged cyber attack reveals vulnerability in power grid [EB/OL]. [2007-09-26]. http://edition. cnn.com/2007/US/09/26/power.at.risk/.
    [7]Bush S F. Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid [M]. West Sussex: Wiley-IEEE Press, 2014.CrossRef
    [8]Andersson G, Donalek P, Farmer R, et al. Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance [J]. IEEE Transactions on Power Systems, 2005, 20(4): 1922–1928.CrossRef
    [9]Federal Energy Regulatory Commission. 2009 Report on enforcemen [EB/OL]. [2013-08-09]. http://ferclitigation. com/wp-content/uploads/0005-FERC-Preliminary-Findings-August-9-2013-2002899_1.pdf.
    [10]Joseph H. Final Report on the August 14, 2003 blackout in the United States and Canada: Causes and Recommendations [EB/OL]. [2004-04-25]. http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/BlackoutFinal-Web.pdf.
    [11]Abduvaliyev A, Pathan A K, Zhou J Y, et al. On the vital areas of intrusion detection systems in wireless sensor networks [J]. IEEE Communications Surveys and Tutorials, 2013, 5(3):1223–1237.CrossRef
    [12]Sundaramurthy S C, Bhatt S, Eisenbarth M R. Examining intrusion prevention system events from worldwide networks[C] // Proc BADGERS 12 ACM Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, New York: ACM Press, 2012:5–12.
    [13]Bessani A. From byzantine fault tolerance to intrusion tolerance [C] // Proc 5th Workshop on Recent Advances in Intrusion-Tolerant Systems, Hong Kong: IEEE Press, 2011: 15–18.
    [14]United States Department of Energy, Infrastructure security and energy restoration division [EB/OL]. [2007-09-27]. http://www.oe.netl.doe.gov/docs/eads/ead092707.pdf.
    [15]Prajapati J K. Smart grid—A vision for the future[C] // Proc 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), Nagapattinam: IEEE Press, 2012: 672–677.
  • 作者单位:Hongtao Li (1)
    Jinsheng Xing (1)
    Jianfeng Ma (2)

    1. College of Mathematics and Computer Science, Shanxi Normal University, Linfen, 041000, Shanxi, China
    2. School of Computer Science and Technology, Xidian University, Xi’an, 710071, Shaanxi, China
  • 刊物类别:Mathematics and Statistics
  • 刊物主题:Mathematics
    Computer Science, general
    Physics
    Life Sciences
    Chinese Library of Science
  • 出版者:Wuhan University, co-published with Springer
  • ISSN:1993-4998
文摘
Security issues and Internet of Things (IoT) become indispensable part in digital community as IoT develops with the pervasive introduction of additional “smart” sensors and devices over the last decades, and it necessitates the implementation of information security principle in digital community system. A three-level criticality model to determine the potential impact is proposed in digital community system when various devices lost in this paper. Combining the actual security requirement of digital community and characteristics of IoT, a hierarchical security architecture including defense-in-deep cybersecurity and distribute secure control is proposed. A high-assurance trust model, which assumes insider compromise, which exists in the digital community, is finally proposed according to the security issues analysis. Keywords digital community Internet of Things(IoT) information security security architecture secure control

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700