Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security management method and security system of sensor network based on distributed ledger technology

A security management and security system technology, applied in transmission systems, computer security devices, electrical digital data processing, etc., can solve the problem that the sensor network cannot realize the security enhancement data sharing function, and there is no blockchain network smart contract, etc. Achieve the effect of ensuring that it is not tampered with, eliminating data sharing, and ensuring the security of data transmission

Active Publication Date: 2021-05-18
SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the actual application process, there is still no deployment of blockchain networks and writing of smart contracts (chain codes) customized for security enhancement.
Therefore, the existing sensor network using consortium chain technology cannot achieve security enhancement or provide controllable data sharing functions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method and security system of sensor network based on distributed ledger technology
  • Security management method and security system of sensor network based on distributed ledger technology
  • Security management method and security system of sensor network based on distributed ledger technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Below, in conjunction with the accompanying drawings, preferred embodiments of the present invention are given and described in detail, so that the functions and features of the present invention can be better understood.

[0042] Before describing the specific content of the invention, the composition of the sensor network system will be explained first. In a large-scale sensor network, it includes but is not limited to the following elements: sensor nodes, sink nodes, regional servers and regional managers, top-level servers and global managers, and alliance chains.

[0043] Such as figure 1 Shown is a typical sensor network, which shows the network topology and components of the sensor network. The sensor network is basically consistent with the existing layered structure of the sensor network, including bottom-up Layer architecture consists of multiple sensor nodes Sen_i, multiple sink nodes Sink_j, multiple regional servers Org_k and a top-level server Adm. Among...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a security management method for a sensor network based on distributed ledger technology, including: selecting the top layer and regional servers as alliance chain nodes to build a consortium chain and storing distributed ledgers; The node generates an asymmetric key, solidifies the private key in the memory, and writes the public key into the alliance chain; uploads the data collected by the sensor node to the regional server through the aggregation node, and the data set is stored in the regional server after verification and encrypt it in the off-chain database, calculate the hash value of the data set and write it into the alliance chain as a deposit certificate; decrypt the data set and calculate its hash value, and then compare it with the deposit certificate in step S3 to verify its correctness, and returns the Uniform Resource Locator. The invention also provides a security system. The safety management method of the invention provides a centralized and effective device management mechanism and data safety verification for a large-scale sensor network, and solves the problem of data sharing and access control.

Description

technical field [0001] The invention belongs to the technical field of the Internet of Things, and in particular relates to a security management method and a security system of a sensor network based on distributed ledger technology. Background technique [0002] Wireless sensor network technology plays an important role in environmental monitoring and governance. Wireless sensor network (Wireless Sensor Network, WSN) refers to the use of a group of widely distributed special sensors to monitor and record the physical information of the environment, and process the collected data in a central location [Sun Hanlin, Zhang Peng, Yan Zheng, et al. .A wireless sensor network architecture based on cloud computing[J].Computer Application Research,2013,30(12):3720-3723]. The wireless sensor network consists of nodes as the basic unit, which are divided into sensor nodes and sink nodes. The sensor nodes carry one or more sensors, including radio transceivers and microcontrollers, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08G06F21/60
CPCG06F21/602H04L67/1097H04L67/12
Inventor 沈国锋周明拓
Owner SHANGHAI INST OF MICROSYSTEM & INFORMATION TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products