Internet of Things security architecture and information security interaction method thereof

An Internet of Things and security technology, applied in the field of network security, can solve the problems of security constraints, the inability to build a unified security architecture for the Internet of Things, and affect the security of the Internet of Things, and achieve the effect of enhancing security, improving security performance, and avoiding network crashes.

Pending Publication Date: 2020-09-08
SHENZHEN POWER SUPPLY BUREAU
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present invention, the inventors found the following technical problems: Since the Internet of Things is usually deployed first and signed later, and various sensor nodes exchange various information with each other, it is impossible to build a unified security architecture for the Internet of Things. Its security is constrained by loose security protocols
However, most sensor nodes are limited by hardware, and it is difficult to completely implement all security protocols, which seriously affects the security of the Internet of Things.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet of Things security architecture and information security interaction method thereof
  • Internet of Things security architecture and information security interaction method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following descriptions of various embodiments refer to the accompanying drawings to illustrate specific embodiments in which the present invention can be implemented.

[0036] Please refer to figure 1 As shown, Embodiment 1 of the present invention provides an Internet of Things security architecture, including:

[0037] A sensor node group, the sensor node group includes a sensor master node (each sensor node group includes a master node, there are multiple sensor node groups) and several sensor member nodes, between the sensor master node and the sensor member nodes Communication by way of identity verification; master node clusters, including: a cluster master node B and several sensor master nodes A, the cluster master node B and sensor master nodes A communicate through identity verification; the aggregation node A , the aggregation node A is used to aggregate the information of all the clustering master nodes B; the sensor node group and the master node clust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Internet of Things security architecture and an information security interaction method thereof. The Internet of Things security architecture comprises a sensor node group,a main node cluster group and an aggregation node, wherein the sensor node group comprises a sensor main node and a plurality of sensor member nodes, and the sensor main node and the sensor member nodes are communicated in an identity verification mode; the main node cluster group comprises a clustering main node and a plurality of sensor main nodes, and the clustering main node and the sensor main nodes are communicated in an identity verification mode; the aggregation node is used for aggregating all information of the clustering main node; and the sensor node group and the main node cluster group are divided according to the operation remaining capacity of the sensor main node or the clustering main node and the distance between the nodes. The capability of the main nodes is fully exerted to implement various network security supervision, so that the security of the Internet of Things is enhanced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an Internet of Things security framework and an information security interaction method thereof. Background technique [0002] The Internet of Things (IOT) refers to the real-time collection of any information that needs monitoring, connection, and interaction through various devices and technologies such as information sensors, radio frequency identification technology, global positioning system, infrared sensors, and laser scanners. Objects or processes, collect various required information such as sound, light, heat, electricity, mechanics, chemistry, biology, location, etc., and realize the ubiquitous connection between things and things, things and people through various possible network access , to achieve intelligent perception, identification and management of items and processes. The Internet of Things is an information carrier based on the Internet, traditiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24G16Y30/10
CPCH04L63/20H04L41/0803H04L41/0813G16Y30/10
Inventor 孙强强丘惠军陈昊连耿雄
Owner SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products