计算机科学 ›› 2024, Vol. 51 ›› Issue (11A): 240200109-6.doi: 10.11896/jsjkx.240200109
黄坚会1,2, 张江江1,2, 沈昌祥1,2, 张建标1,2, 王亮3
HUANG Jianhui1,2, ZHANG Jiangjiang1,2, SHEN Changxiang1,2, ZHANG Jianbiao1,2, WANG liang3
摘要: 现有的可信评估都是基于计算机软件扫描或可信模块通过本机报告或网络远程证明来实现的,这提供了本机执行环境构建过程及运行态的可信度量保障,但从网络应用角度来看,还存在着系统性的安全风险。文中提出一种在可信平台控制模块(TPCM)内部增加实现的网络节点信任评估方法来解决这个问题。该方法在双体系架构(计算+防御)下通过防御单元的TPCM来实现快速可靠的信任评估系统,评估后的可信值通过TPCM进行存储和维护。该方案既避免设备受攻击后的伪造,又释放了CPU的计算资源。通过研究基于TPCM支撑的网络节点信任评估系统,实现了轻量级计算机网络平台节点可信性的系统性评估,保障了网络的安全可信运行。
中图分类号:
[1]ALWARAFY A,AL-THELAYA K A,ABDALLAH M,et al.A survey on security and privacy issues in edge-computing-assisted internet of things[J].IEEE Internet of Things Journal,2020,8(6):4004-4022. [2]LIU L,MA Z,MENG W.Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks[J].Future Generation Computer Systems,2019,101:865-879. [3]SOUISSI I,AZZOUNA N B,SAID L B.A multi-level study ofinformation trust models in WSN-assisted IoT[J].Computer Networks,2019,151:12-30. [4]HE Y,YU F R,WEI Z,et al.Trust management for secure cognitive radio vehicular ad hoc networks[J].Ad Hoc Networks,2019,86:154-165. [5]LU Z,QU G,LIU Z.A survey on recent advances in vehicular network security,trust,and privacy[J].IEEE Transactions on Intelligent Transportation Systems,2018,20(2):760-776. [6]DAS R,DASH D,SARKAR M K.HTMS:fuzzy based hierarchical trust management scheme in WSN[J].Wireless Personal Communications,2020,112(2):1079-1112. [7]ALNASSER A,SUN H,JIANG J.Recommendation-based trust model for vehicle-to-everything(V2X)[J].IEEE Internet of Things Journal,2019,7(1):440-450. [8]SHAYESTEH B,HAKAMI V,AKBARIA.A trust manage-ment scheme for IoT-enabled environmental health/accessibility monitoring services[J].International Journal of Information Security,2020,19(1):93-110. [9]SHEN C X.Building Cyber Security Defense by Trusted Computing 3.0[J].Journal of Information Security Research,2017,3(4):290-298. [10]GB/T 40650-2021.可信平台控制模块[S].北京:中国标准出版社,2021. [11]HUANG J H,SHEN C X,XIE W L.The TPCM 3P3C Defense Architecture of Safety and Trusted Platform [J].J.Wuhan Univ.(Nat.SCI.Ed.),2018,64(2):109-114. [12]ZHANG J,NING Z,CAO H.An Intelligent Trusted Edge Data Production Method for Distributed Internet of Things,Neural Computing and Applications[J].Neural Computing & Applications,2023,35(29):21333-21347. [13]ZHANG J,NING Z,WAQAS R A M,et al.A Many-objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem[J],IEEE Transactions on Mobile Computing,2023,23(2):1330-1346. [14]SINGH J,BELLO Y,HUSSEINA R,et al.Hierarchical Security Paradigm for IoT Multiaccess Edge Computing[J].IEEE Internet Things J.,2021,8(7):5794-5805. [15]ZHANG P,JIANG C,PANG X,et al.STEC-IoT:A Security Tactic by Virtualizing Edge Computing on IoT[J].IEEE Internet Things J.,2021,8(4):2459-2467. [16]BASSET M A,MANOGARAN G,MOHAMED M.A Neutrosophic theory based security approach for fog and mobile-edge computing[J].Computer Networks,2019,157:122-132. [17]ELGENDY I A,ZHANG W,TIAN Y C,et al.Resource allocation and computation offloading with data security for mobile edge computing[J].Future Generation Computer Systems,2019,100:531-541. [18]TSAI J L,LO N W.A Privacy-Aware Authentication Schemefor Distributed Mobile Cloud Computing Services[J].IEEE Systems Journal,2017,9(3):805-815. [19]HUANG B,LI Z,TANG P,et al.Security modeling and efficient computation offloading for service workflow in mobile edge computing[J].Future Generation Computer Systems,2019,97:755-774. [20]AAKASH B,ZACHARY E,ZACHARY K,et al.Graph Context Encoding for Neural Source Code Summarization[J].IEEE Transactions on Software Engineering,2023,49(9):4268- 4281. [21]HUANG J H,SHEN C X.Trusted Platform Design of Serverwith TPCM Active Defense [J].Journal of Zhengzhou University(Natural Science Edition),2019,51(3):1-6. |
|