Sensing layer-oriented Internet of Things trusted connection method and system
A connection method and connection system technology, applied in the trusted connection method and system field of the Internet of Things, can solve the problems of identity authentication not meeting the security requirements of the Internet of Things, threats to the security of the Internet of Things, and insecure Internet of Things network connections, etc., to achieve guaranteed reliability Reliability, good applicability, and the effect of improving usability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0037] Embodiment 1: A trusted connection method for the Internet of Things oriented to the perception layer, comprising:
[0038] Step 1: Initialization process. The perception layer nodes measure the feasibility of their own platform before connecting to the network.
[0039] Step 2: The perception layer node sends an access request to the sink node and the continuation head node;
[0040] Step 3: After the aggregation node and the cluster head node receive the request, with the assistance of the Internet of Things Security Authentication Center, realize the two-way identity authentication with the perception layer node;
[0041] Step 4: The aggregation node and the cluster head node respectively send a platform integrity authentication request to the perception layer node;
[0042]Step 5: The perception layer node receives the platform integrity authentication request information of the aggregation node and the cluster head node, starts the authentication process, and exe...
Embodiment 2
[0050] Embodiment 2: On the basis of Embodiment 1, a perceptual layer-oriented IoT trusted connection method provided in this embodiment further includes the following steps after step seven:
[0051] Step 8: The aggregation node and the cluster head node request the behavior attribute measurement from the perception layer node. Step 9: The behavior attribute collector of the perception layer node collects the behavior attribute information parameters and transmits the collected behavior attribute information to the attribute verifier.
[0052] Step 10: The attribute verifier verifies the behavior attribute information of the perception layer node, including judging whether the behavior attribute of the perception layer node conforms to the specific access strategy according to the behavior attribute information. If it conforms to the specific access strategy, the subsequent network access of the perception layer node is allowed. Otherwise, notify the sink node and the cluster...
Embodiment 3
[0054] Embodiment 3: On the basis of Embodiment 1 or Embodiment 2, this embodiment provides an IoT trusted connection method oriented to the perception layer, which further includes verifying the credibility of the behavior attributes of the perception layer nodes.
[0055] The authenticity of the behavior attributes of the perception layer nodes is verified, combined with the behavior attribute measurement of the perception layer nodes and the platform integrity measurement, to ensure the trusted connection of the nodes.
[0056] The behavior attributes of the perception layer nodes are composed of direct behavior attributes and indirect behavior attributes. The direct behavior attributes include the subject attributes, object attributes and environment attributes of the perception layer nodes, and the indirect behavior attributes refer to the behavior attributes of the perception layer nodes extracted by the convolutional neural network.
[0057] The process of authenticity ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com