sensor-cloud systems have received wide attention from both academia and industry. Sensor-cloud system not only improves performances of wireless sensor networks (WSNs), but also combines different functional WSNs together to provide comprehensive services. However, a variety of malicious attacks threaten the sensor-cloud security, such as integrity, authenticity, availability and so on. Traditional available security mechanisms (e.g. cryptography and authentication) are still vulnerable. Although there are schemes to provide security by trust evaluation, the evaluation considers whether or not a sensor is credible only by checking the communication behaviors. Furthermore, when mobile sensor sinks are employed to collect sensing data, there appears a type of attacks called replicated sink attacks that are often ignored in the previous work. These attacks may bring serious vulnerability to trustworthy data collection in sensor-cloud systems. A comprehensive trustworthy data collection (CTDC) approach is proposed for sensor-cloud systems. Three kinds of trust, i.e., direct trust, indirect trust, and functional trust are defined to evaluate the trustworthiness of both sensors and mobile sinks.

Java Demo

Leave a Reply

Your email address will not be published. Required fields are marked *