Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Perceptual Layer Data Fidelity Method for Local Internet of Things

A technology for perceiving data and local objects, which is applied in the field of data fidelity of the perception layer for the local Internet of Things, and can solve the problems that verification information is easily changed by a third party, and identity verification results are tampered with.

Inactive Publication Date: 2020-06-26
CHINA UNIV OF PETROLEUM (BEIJING)
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] In the above prior art, although an effective solution is provided for the identity verification of the sensing node, during the identity verification process, the verification information in the identity verification module and the system is easily changed by a third party or by a malicious node, thus Will lead to the risk of tampering with the authentication results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Perceptual Layer Data Fidelity Method for Local Internet of Things
  • A Perceptual Layer Data Fidelity Method for Local Internet of Things
  • A Perceptual Layer Data Fidelity Method for Local Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] according to figure 1 As shown, this embodiment provides a data fidelity method of the perception layer for the local Internet of Things. This fidelity method includes:

[0040] A trusted execution environment processor 200 is set between the sensing node 100 and the gateway 300 in the local Internet of Things. In the prior art, the verification of the sensing node 100 is carried out in an open environment. Although the identity of the sensing node 100 can be identified, the verification method has untrustworthy risks such as tampering and intrusion. Therefore, authentication of the sensing node 100 in an open environment may easily cause illegal sensing data to flow in the network together with normal sensing data. Specifically, first, this will increase the risk of illegal sensing data tampering with normal sensing data and cause normal sensing data to be distorted; The difficulty increases significantly as the number of sensing nodes 100 increases; thirdly, the se...

Embodiment 2

[0060] This embodiment may be a further improvement and / or replacement of Embodiment 1, and repeated content will not be repeated here. This embodiment discloses that the whole and / or part of the preferred implementation manners of other embodiments may be used as a supplement to this embodiment under the condition that no conflict or contradiction is caused.

[0061] Such as image 3 As shown, preferably, the trusted execution environment processor 200 identifies at least two sensing nodes 100 requesting access in the specified local area network, and allows the sensing data collected by the sensing nodes 100 after successful identification verification to be transmitted. To the fog end FC and / or after being preprocessed by the fog end FC, it is transmitted to the cloud CC. 1. Set up a trusted execution environment processor 200 between the fog end FC and the cloud CC. On the premise that the credibility of the data generated in the local area Internet of Things has been ens...

Embodiment 3

[0063] This embodiment discloses a system for performing the relevant steps and methods in Embodiment 1 and / or 2.

[0064] A kind of perceptual layer data fidelity system oriented to the local Internet of Things in this embodiment, such as figure 1 shown. A trusted execution environment processor is set between the sensing node and the gateway in the local Internet of Things. The trusted execution environment processor is configured to extract the identity attribute set of the sensing node before the sensing node accesses the gateway, and based on the identity attribute The set identifies the identity of the sensing node, so that the trusted execution environment processor can be used to intercept the risk sensing node with suspected identity before the sensing data collected by the sensing node passes through the gateway.

[0065] Preferably, the trusted execution environment processor composes at least one identity attribute element of the sensing node into an identity attr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a perception layer data fidelity method for the local Internet of Things, comprising: setting a trusted execution environment processor between the sensing node and the gateway in the local Internet of Things, and the trusted execution environment processes The processor can be used to intercept the risk-aware node with suspected identity before the sensing data collected by the sensing node passes through the gateway; wherein, the trusted execution environment processor is configured to: before the sensing node accesses the gateway, extract the The identity attribute set of the sensing node is used to identify the identity of the sensing node. The identity verification of the sensing node is carried out in the trusted execution environment. Since the trusted execution environment is a completely trusted part of the network, it can be responsible for sensitive operations such as identity verification. Therefore, the identity verification of the sensing node is performed in the trusted execution environment. is completely believable.

Description

technical field [0001] The invention relates to the field of Internet of Things data fidelity methods, in particular to a perception layer data fidelity method for the local Internet of Things. Background technique [0002] When the Internet of Things (IoT) was first proposed, it was defined as: connecting all items to the Internet through radio frequency identification and other information sensing devices to realize intelligent identification and management. With the development of science and technology, it has a relatively complete definition. For example, in China, it is defined as: connecting ubiquitous terminal equipment and facilities through various wireless and / or wired long-distance and / or short-distance The communication network realizes interconnection, application integration, and SaaS operation based on cloud computing, etc., and adopts an appropriate information security mechanism in the environment of the intranet (Intranet), private network (Extranet), and / ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/00H04W12/40H04W12/69
CPCH04L63/10H04L63/1441H04L67/12H04W12/009H04W12/40H04W12/69
Inventor 范永开赵冠群林晓东孙啸峰雷霞白建蓉王憬晗雷晶刘家旭马俊杰彭聪夏方略
Owner CHINA UNIV OF PETROLEUM (BEIJING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products