Perception layer data fidelity method for local area Internet of Things

A technology for sensing data and local objects, which is applied in the field of data fidelity at the perception layer for the local Internet of Things, and can solve problems such as changes, verification information easily changed by third parties, and identity verification results being tampered with.

Inactive Publication Date: 2019-11-19
CHINA UNIV OF PETROLEUM (BEIJING)
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In the above prior art, although an effective solution is provided for the identity verification of the sensing node, during the identity verification process, the verification information in the identity verification module and the system is easily changed by a third party or by a malicious node, thus Will lead to the risk of tampering with the authentication results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Perception layer data fidelity method for local area Internet of Things
  • Perception layer data fidelity method for local area Internet of Things
  • Perception layer data fidelity method for local area Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] according to figure 1 As shown, this embodiment provides a data fidelity method of the perception layer oriented to the local Internet of Things. This fidelity method includes:

[0040] A trusted execution environment processor 200 is provided between the sensing node 100 and the gateway 300 in the local Internet of Things. In the prior art, the verification of the sensing node 100 is carried out in an open environment. Although the identity of the sensing node 100 can be identified, the verification method is subject to untrustworthy risks such as tampering and intrusion. Therefore, the identity verification of the sensing node 100 in an open environment may easily cause illegal sensing data to flow along with normal sensing data in the network. Specifically, first, this will increase the risk of illegal perception data tampering with normal perception data and cause normal perception data to be distorted; second, the perception node 100 of the perception layer of the In...

Embodiment 2

[0060] This embodiment may be a further improvement and / or replacement of Embodiment 1, and the repeated content will not be repeated. This embodiment discloses that the whole and / or part of the content of the preferred implementation manners of other embodiments can be used as a supplement to this embodiment without causing conflict or contradiction.

[0061] Such as image 3 As shown, preferably, the trusted execution environment processor 200 identifies each at least two sensing nodes 100 in the designated local area network that request access, and allows the sensing data collected by the sensing node 100 after successful identification verification to be transmitted To the fog end FC and / or preprocessed by the fog end FC and then transmitted to the cloud CC. 1. Set up a trusted execution environment processor 200 between the fog-side FC and the cloud CC. On the premise that the credibility of the data generated in the local local Internet of Things has been guaranteed in the...

Embodiment 3

[0063] This embodiment discloses a system for executing relevant steps and methods in Embodiments 1 and / or 2.

[0064] The perceptual layer data fidelity system for the local Internet of Things of this embodiment, such as figure 1 Shown. A trusted execution environment processor is set between the sensing node and the gateway in the local Internet of Things. The trusted execution environment processor is configured to extract the identity attribute set of the sensing node before the sensing node accesses the gateway, and based on the identity attribute Collectively identify the identity of the sensing node, so that the trusted execution environment processor can be used to intercept the risk sensing node with a suspected identity before the sensing data collected by the sensing node passes through the gateway.

[0065] Preferably, the trusted execution environment processor composes at least one identity attribute element of the sensing node into an identity attribute set in a logi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a perception layer data fidelity method for a local area internet of things. The perception layer data fidelity method comprises the steps that a trusted execution environmentprocessor is arranged between a sensing node and a gateway in the local area Internet of Things, and the trusted execution environment processor can be used for intercepting a risk sensing node witha suspected identity before sensing data collected by the sensing node passes through the gateway, wherein the trusted execution environment processor is configured to extract an identity attribute set of the sensing node before the sensing node accesses the gateway, and the identity attribute set is used for identifying the identity of the sensing node. The identity authentication of the sensingnode is carried out in a trusted execution environment, and the trusted execution environment is a completely trusted part in the network and can be responsible for sensitive operations such as identity authentication, so that the identity authentication of the sensing node is completely trusted in the trusted execution environment.

Description

Technical field [0001] The present invention relates to the field of data fidelity methods for the Internet of Things, in particular to a data fidelity method of the perception layer oriented to the local Internet of Things. Background technique [0002] When the Internet of Things (IoT) was first proposed, it was defined as connecting all items to the Internet through information sensing equipment such as radio frequency identification to realize intelligent identification and management. With the development of science and technology, it has a more complete definition. For example, in China, it is defined as: the ubiquitous terminal equipment and facilities through various wireless and / or wired long and / or short distances The communication network realizes interconnection and interoperability, application integration, and cloud computing-based SaaS operation modes. In the intranet, extranet, and / or Internet environment, appropriate information security assurance mechanisms are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/00H04W12/40H04W12/69
CPCH04L63/10H04L63/1441H04L67/12H04W12/009H04W12/40H04W12/69
Inventor 范永开赵冠群林晓东孙啸峰雷霞白建蓉王憬晗雷晶刘家旭马俊杰彭聪夏方略
Owner CHINA UNIV OF PETROLEUM (BEIJING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products