Sensing layer-oriented Internet of Things trusted connection method and system

A connection method and connection system technology, applied in the trusted connection method and system field of the Internet of Things, can solve the problems of identity authentication not meeting the security requirements of the Internet of Things, threats to the security of the Internet of Things, and insecure Internet of Things network connections, etc., to achieve guaranteed reliability Reliability, good applicability, and the effect of improving usability

Active Publication Date: 2021-04-09
STATE GRID ELECTRIC POWER RES INST +3
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] An important task of the perception layer of the Internet of Things is network connection. When connecting to the network, the nodes of the perception layer adopt an identity authentication mechanism, but the credibility of identity authentication does not mean the credibility of node functions. Therefore, the existing identity authentication mechanism It cannot resist the access of illegal terminals,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0037]Example 1: An Internet of Internet access trusted connection method for perceived layers, including:

[0038]Step 1: Initialization process. The perceived layer node measures the feasibility of its own platform before the network connection.

[0039]Step 2: Perceived layer nodes send access requests to the aggregation node and the resumed head node;

[0040]Step 3: After receiving the request, the aggregation node and the cluster head node receive the request, the two-way identity identification of the perceived layer node is achieved with the assistance of the Internet Security Certification Center;

[0041]Step 4: The aggregation node and the cluster head node are respectively authenticated to the perceived layer node;

[0042]Step 5: The perceived layer node receives the aggregation node and the cluster head node integrity authentication request information, start the authentication process, perform the authentication protocol to realize the identification of the sense layer node platform...

Example Embodiment

[0050]Example 2: On the basis of the first embodiment, an Internet of Think trusted connection method for a perceived layer provided in this embodiment, and step seven, further includes the following steps:

[0051]Step 8: The aggregation node and the cluster head node request a metric to the perceptual layer node. Step Nine: Perceptual layer node behavior attribute collectors collect behavior attribute information parameters and pass the collected behavior attribute information to the attribute checkor.

[0052]Step 10: Attribute Verifers Check whether the perceived layer behavior attribute information includes determining whether the behavior attribute of the behavior attribute information is in line with the specific access policy, if the specific access policy is met, the awareness of the layer node is allowed to be subsequent networks Behavior, otherwise notify the aggregation node and the cluster head node to control the sense layer node network connection.

[0053]Where a trusted netw...

Example Embodiment

[0054]Example 3: On the basis of Example 1 or Embodiment 2, a trusted connection method of an instructive layer provided by the present embodiment, further comprising verifying the behavioral attribute trustidity of the perceived layer node.

[0055]The verification is verified by a sense of behavioral attributes of the awareness layer node, combining the behavior attribute metric and platform integrity metrics of the perceived layer node, and the trusted connection of the node is guaranteed.

[0056]The behavior attribute of the perceived layer node is composed of direct behavior attributes and indirect behavior attributes. Direct behavior attributes include the body properties, object properties, and environmental properties of the perceived layer node, and indirect behavior attributes refer to the perceptual layer node behavior attributes extracted by convolutional neural network.

[0057]The trusted verification process of behavioral attributes in the perceived layer node network connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a sensing layer-oriented Internet of Things trusted connection method and system, the Internet of Things comprises a sensing layer node, a cluster head node and an aggregation node, and the method comprises the following steps: the sensing layer node sends a network access request to the aggregation node and the cluster head node respectively; the sensing layer node responds to information returned by the aggregation node and the cluster head node according to the network access request to execute bidirectional identity authentication of the sensing layer node and the aggregation node and bidirectional identity authentication of the sensing layer node and the cluster head node; if the two-way identity authentication is passed, platform credibility identification and platform integrity verification are executed; and if the platform credibility identification and the platform integrity verification are both passed, trusted network connection is established. According to the method, bidirectional authentication and behavior attribute authentication of each node are realized, and the method has good applicability to the nodes in the Internet of Things, has the characteristics that the nodes can be monitored and measured, can guarantee the credibility of data information, and improves the availability of the network.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a method and system for trusted connection of the Internet of Things oriented to the perception layer. Background technique [0002] An important task of the perception layer of the Internet of Things is network connection. When connecting to the network, the nodes of the perception layer adopt an identity authentication mechanism, but the credibility of identity authentication does not mean the credibility of node functions. Therefore, the existing identity authentication mechanism The access of illegal terminals cannot be resisted, so the network connection of the Internet of Things is not safe. [0003] The importance of node identity in the network connection model of the Internet of Things is greater than that of nodes in the traditional network connection model. The rapid development of the Internet of Things has brought more and more serious security threats...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/10H04L29/06H04L29/08G06N3/04
CPCH04W12/06H04L63/0869H04W12/10H04L63/10H04L67/141H04L67/12G06N3/045
Inventor 于佳李洋李维完颜绍澎陆忞刘少君何莉媛丁忠林
Owner STATE GRID ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products