Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method and system based on historical data

A technology of historical data and verification methods, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problems of reducing the security of the Internet of Things and the difficulty of authenticity, so as to ensure security and privacy, prevent Attack, increase the effect of reliability

Active Publication Date: 2017-08-11
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, some security problems in the traditional Internet also follow. Among them, the most important one is the reliability of nodes in the Internet of Things
Once the IP address of the node in the Internet of Things is fraudulently used, the authenticity of the data uploaded by the node will be difficult to guarantee, which will reduce the security of the Internet of Things

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and system based on historical data
  • Verification method and system based on historical data
  • Verification method and system based on historical data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention are described in detail below, and examples of the embodiments are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0020] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a verification method based on historical data, including: the sensor node packs the data to generate a message according to the first verification information generated by the historical sending data and the password, and sends a sending request to the neighbor node, wherein the historical sending data is N-dimensional vector; when the sensor node is in the neighbor list of the neighbor node, the neighbor node accepts the sending request and verifies the message; and when the first verification information is equal to the second verification generated by the historical receiving data and password of the neighbor node When receiving information, the neighbor node receives the message, that is, obtains the data, wherein the historical received data is an N-dimensional vector. The verification method based on historical data in the embodiment of the present invention, by verifying the verification information generated by historical data and passwords between sensor nodes, effectively prevents intrusion nodes and fake nodes from attacking the network, and increases data transmission between sensors. The reliability ensures the security and privacy of the network.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a verification method and system for historical data. Background technique [0002] The Internet of Things refers to a network formed by collecting real-time information on objects or processes that need to be monitored, connected, and interacted with through various information sensing devices, and combining the collected information with the Internet. Its purpose is to realize the connection between things and things, things and people, and all things and the Internet, making the identification, management and control of things more convenient and intelligent. After the Internet of Things nodes are assigned the same IP (Internet Protocol, the protocol for interconnection between networks) addresses as Internet terminals, unified management is realized in addressing, routing, communication, etc. [0003] However, some security problems in the traditional Internet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04W36/00H04W84/18
Inventor 徐恪陈鹏王文东
Owner BEIJING UNIV OF POSTS & TELECOMM