Hierarchical access control method for Internet of Things

A technology of layered control and Internet of Things, applied in security devices, electrical components, wireless communication, etc., can solve problems such as device clustering and network layered device trust management without in-depth consideration

Active Publication Date: 2021-12-07
深圳中科智绘湾技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing research does not deeply consider device clustering, network layering, and trust management for devices involved in blockchain-based IoT access control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical access control method for Internet of Things
  • Hierarchical access control method for Internet of Things
  • Hierarchical access control method for Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic concept of the present invention, and the following embodiments and the features in the embodiments can be combined with each other in the case of no conflict.

[0041] Wherein, the accompanying drawings are for illustrative purposes only, and represent only schematic diagrams, rather than physical drawings, and should...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a hierarchical access control method for the Internet of Things, and belongs to the field of resource access control of the Internet of Things. The method comprises the following steps: constructing an Internet of Things equipment cluster by adopting an improved K-means algorithm; determining an association relationship between the cluster head equipment and the gateway node by adopting a matching algorithm; constructing a global block chain network by the gateway node; constructing a local block chain network by the cluster head device; sending access request information to the associated cluster head device by the source device, wherein the cluster head device judges an access type; if the access is the intra-domain access, calculating a trust value of the source equipment, and judging the credibility of the source equipment; if the source device is credible, calling a local block chain contract, obtaining target device data, and sending the target device data to the source device; if not, the cluster head device rejecting the access request of the source device; if the access is inter-domain access, the cluster head device forwarding access request information to a gateway node; the gateway node judging the credibility of the source equipment; if the source device is credible, calling a global block chain contract, obtaining target device data, and sending the target device data to the source device; and if not, the cluster head device denying the access request.

Description

technical field [0001] The invention belongs to the technical field of resource access control of the Internet of Things, and relates to a layered access control method of the Internet of Things. Background technique [0002] The rapid development of the Internet of Things technology has brought about a huge digital transformation, which is profoundly changing the traditional industrial form and people's production and lifestyle. It is estimated that by the end of 2025, the number of global IoT devices will reach 41.6 billion. The diversification of Internet of Things applications has changed the fields of industrial manufacturing and smart life, and it has also brought security risks. The Internet of Things generates massive amounts of data, including a large amount of personal privacy and security information. Once leaked, it will bring great losses to users. Identity authentication and access control to resources and services are the main ways to protect the security an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/60
CPCH04W12/08H04W12/66
Inventor 柴蓉蒋汶航杨锡政陈前斌
Owner 深圳中科智绘湾技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products