China Communications • February 2018
104
3. The remote node veri es the group sig-
nature and queries the parent node of the node
whether the node is a trusted node. Revoke
data transfer if it is an untrusted node.
The proof mechanism has the character-
istics of node measurable, monitorable and
extensible, which can effectively con rm the
data source and improve the usability of the
system.
As shown in Figure 1, the mechanism pre-
sented in this section first formats the proof
data of the node into a remote proof vector
and then select a revocable group signature
mechanism. This mechanism can achieve the
proof of security under the standard model and
have the characteristics of no relevance back
at the same time conform to the traceability,
anonymity, some security requirements, such
as correctness.
The main research of remote attestation
mechanism based on the trusted degree of
the node includes: 1 Remote proof vector
formatting, node external proof content is
based on the third chapter of the credibility
and node-related description to abstract, and it
at least should contain node credibility, time-
stamp, node computing environment and other
attributes; 2 Signature algorithm, the design
of the revocation of the signature method is
under the standard model. The method has
node traceability, which can effectively protect
the anonymity of the node security needs. The
method also has high security and practica-
bility, and satis es the backward association,
and the signature algorithm has better envi-
ronmental adaptability; 3 It can be based on
remote attestation results to trace and track the
authenticity of the node in real time.
THE DTRUSTED EASURE
SNODE
node
According to computing power and energy,
there are three types of nodes in a sensing
network: ordinary nodes, cluster head nodes
of the system’s behavior history as a proof of
the trust of the platform. But behavior-based
teleworking uses a whitelist form in its trusted
behavior anticipation strategy and requires
that all actions be known, and in fact most of
the behavior is unknown and that there are
dif culties in achieving it; and it is necessary
to record the system behavior, increasing the
overhead of the system and affecting the per-
formance of the system.
The trusted measurement model of nodes can
calculate the trusted degree of node at any
moment. The data transmission node needs
to prove its own trust when transmitting data,
which needs to send the information related
to the node reliability to the remote node. The
remote node inquires the node at the higher
level of the node according to the information
it receives whether it is an untrusted node, and
decides whether to transfer data to the node
based on the query results. The specific pro-
cess is described as follows:
1. The data sending node formats its own
trust, timestamp and other attributes into a re-
mote proof vector;
2. The data sending node and its parent
node complete the group signature of the re-
mote proof vector (the group signature satis-
es the revocable and forward security);
Fig. 1. A remote attestation mechanism based on the trusted degree of the node.
………
remote node
proof node
proof node
proof node
parent node
signature proof
trusted query