Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensing layer-oriented Internet of Things trusted connection method and system

A connection method and connection system technology, applied in the trusted connection method and system field of the Internet of Things, can solve the problems of identity authentication not meeting the security requirements of the Internet of Things, threats to the security of the Internet of Things, and insecure Internet of Things network connections, etc., to achieve guaranteed reliability Reliability, good applicability, and the effect of improving usability

Active Publication Date: 2021-04-09
STATE GRID ELECTRIC POWER RES INST +3
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] An important task of the perception layer of the Internet of Things is network connection. When connecting to the network, the nodes of the perception layer adopt an identity authentication mechanism, but the credibility of identity authentication does not mean the credibility of node functions. Therefore, the existing identity authentication mechanism It cannot resist the access of illegal terminals, so the network connection of the Internet of Things is not safe
[0003] The importance of node identity in the network connection model of the Internet of Things is greater than that of nodes in the traditional network connection model. The rapid development of the Internet of Things has brought more and more serious security threats, and general identity authentication cannot achieve IoT Security Requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Embodiment 1: A trusted connection method for the Internet of Things oriented to the perception layer, comprising:

[0038] Step 1: Initialization process. The perception layer nodes measure the feasibility of their own platform before connecting to the network.

[0039] Step 2: The perception layer node sends an access request to the sink node and the continuation head node;

[0040] Step 3: After the aggregation node and the cluster head node receive the request, with the assistance of the Internet of Things Security Authentication Center, realize the two-way identity authentication with the perception layer node;

[0041] Step 4: The aggregation node and the cluster head node respectively send a platform integrity authentication request to the perception layer node;

[0042]Step 5: The perception layer node receives the platform integrity authentication request information of the aggregation node and the cluster head node, starts the authentication process, and exe...

Embodiment 2

[0050] Embodiment 2: On the basis of Embodiment 1, a perceptual layer-oriented IoT trusted connection method provided in this embodiment further includes the following steps after step seven:

[0051] Step 8: The aggregation node and the cluster head node request the behavior attribute measurement from the perception layer node. Step 9: The behavior attribute collector of the perception layer node collects the behavior attribute information parameters and transmits the collected behavior attribute information to the attribute verifier.

[0052] Step 10: The attribute verifier verifies the behavior attribute information of the perception layer node, including judging whether the behavior attribute of the perception layer node conforms to the specific access strategy according to the behavior attribute information. If it conforms to the specific access strategy, the subsequent network access of the perception layer node is allowed. Otherwise, notify the sink node and the cluster...

Embodiment 3

[0054] Embodiment 3: On the basis of Embodiment 1 or Embodiment 2, this embodiment provides an IoT trusted connection method oriented to the perception layer, which further includes verifying the credibility of the behavior attributes of the perception layer nodes.

[0055] The authenticity of the behavior attributes of the perception layer nodes is verified, combined with the behavior attribute measurement of the perception layer nodes and the platform integrity measurement, to ensure the trusted connection of the nodes.

[0056] The behavior attributes of the perception layer nodes are composed of direct behavior attributes and indirect behavior attributes. The direct behavior attributes include the subject attributes, object attributes and environment attributes of the perception layer nodes, and the indirect behavior attributes refer to the behavior attributes of the perception layer nodes extracted by the convolutional neural network.

[0057] The process of authenticity ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a sensing layer-oriented Internet of Things trusted connection method and system, the Internet of Things comprises a sensing layer node, a cluster head node and an aggregation node, and the method comprises the following steps: the sensing layer node sends a network access request to the aggregation node and the cluster head node respectively; the sensing layer node responds to information returned by the aggregation node and the cluster head node according to the network access request to execute bidirectional identity authentication of the sensing layer node and the aggregation node and bidirectional identity authentication of the sensing layer node and the cluster head node; if the two-way identity authentication is passed, platform credibility identification and platform integrity verification are executed; and if the platform credibility identification and the platform integrity verification are both passed, trusted network connection is established. According to the method, bidirectional authentication and behavior attribute authentication of each node are realized, and the method has good applicability to the nodes in the Internet of Things, has the characteristics that the nodes can be monitored and measured, can guarantee the credibility of data information, and improves the availability of the network.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a method and system for trusted connection of the Internet of Things oriented to the perception layer. Background technique [0002] An important task of the perception layer of the Internet of Things is network connection. When connecting to the network, the nodes of the perception layer adopt an identity authentication mechanism, but the credibility of identity authentication does not mean the credibility of node functions. Therefore, the existing identity authentication mechanism The access of illegal terminals cannot be resisted, so the network connection of the Internet of Things is not safe. [0003] The importance of node identity in the network connection model of the Internet of Things is greater than that of nodes in the traditional network connection model. The rapid development of the Internet of Things has brought more and more serious security threats...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04W12/10H04L29/06H04L29/08G06N3/04
CPCH04W12/06H04L63/0869H04W12/10H04L63/10H04L67/141H04L67/12G06N3/045
Inventor 于佳李洋李维完颜绍澎陆忞刘少君何莉媛丁忠林
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products