Sensing layer-oriented Internet of Things trusted connection method and system
A connection method and connection system technology, applied in the trusted connection method and system field of the Internet of Things, can solve the problems of identity authentication not meeting the security requirements of the Internet of Things, threats to the security of the Internet of Things, and insecure Internet of Things network connections, etc., to achieve guaranteed reliability Reliability, good applicability, and the effect of improving usability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0037]Example 1: An Internet of Internet access trusted connection method for perceived layers, including:
[0038]Step 1: Initialization process. The perceived layer node measures the feasibility of its own platform before the network connection.
[0039]Step 2: Perceived layer nodes send access requests to the aggregation node and the resumed head node;
[0040]Step 3: After receiving the request, the aggregation node and the cluster head node receive the request, the two-way identity identification of the perceived layer node is achieved with the assistance of the Internet Security Certification Center;
[0041]Step 4: The aggregation node and the cluster head node are respectively authenticated to the perceived layer node;
[0042]Step 5: The perceived layer node receives the aggregation node and the cluster head node integrity authentication request information, start the authentication process, perform the authentication protocol to realize the identification of the sense layer node platform...
Example Embodiment
[0050]Example 2: On the basis of the first embodiment, an Internet of Think trusted connection method for a perceived layer provided in this embodiment, and step seven, further includes the following steps:
[0051]Step 8: The aggregation node and the cluster head node request a metric to the perceptual layer node. Step Nine: Perceptual layer node behavior attribute collectors collect behavior attribute information parameters and pass the collected behavior attribute information to the attribute checkor.
[0052]Step 10: Attribute Verifers Check whether the perceived layer behavior attribute information includes determining whether the behavior attribute of the behavior attribute information is in line with the specific access policy, if the specific access policy is met, the awareness of the layer node is allowed to be subsequent networks Behavior, otherwise notify the aggregation node and the cluster head node to control the sense layer node network connection.
[0053]Where a trusted netw...
Example Embodiment
[0054]Example 3: On the basis of Example 1 or Embodiment 2, a trusted connection method of an instructive layer provided by the present embodiment, further comprising verifying the behavioral attribute trustidity of the perceived layer node.
[0055]The verification is verified by a sense of behavioral attributes of the awareness layer node, combining the behavior attribute metric and platform integrity metrics of the perceived layer node, and the trusted connection of the node is guaranteed.
[0056]The behavior attribute of the perceived layer node is composed of direct behavior attributes and indirect behavior attributes. Direct behavior attributes include the body properties, object properties, and environmental properties of the perceived layer node, and indirect behavior attributes refer to the perceptual layer node behavior attributes extracted by convolutional neural network.
[0057]The trusted verification process of behavioral attributes in the perceived layer node network connect...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap