Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

IOT equipment behavior credibility supervision method based on block chain

A blockchain and behavioral technology, applied in wireless communication, secure communication devices, digital transmission systems, etc., can solve the problems of IoT equipment being easily hijacked, network node denial of service, and damage to network equipment, etc., to avoid network crashes, Satisfy the effect of trust building and promoting mutual cooperation

Active Publication Date: 2021-07-13
QINGDAO UNIV OF SCI & TECH
View PDF13 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These IoT devices are vulnerable to hijacking
Hijacked IoT devices are often illegally invoked and controlled by malicious software, resulting in abnormal behaviors such as denial of service, information interception, and injection of a large number of redundant data packets on network nodes, which in turn enables criminals to achieve the purpose of destroying network devices and tampering with data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IOT equipment behavior credibility supervision method based on block chain
  • IOT equipment behavior credibility supervision method based on block chain
  • IOT equipment behavior credibility supervision method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The implementation process of the present invention will be described below by taking the smart IOT device used in the company's smart office as an example. Suppose the solution includes smart door locks, smart switches, smart sockets, smart lights, smart speakers, smart air conditioners, smart water heaters, smart refrigerators, smart environmental sensors, smart sweeping robots, smart gateways, smart security alarms, cameras and other IOT devices , the communication protocols used by these devices are often very simple and extremely easy to be invaded.

[0023] During the implementation of this plan, the company's internal department classification is used as the standard to divide the company into multiple parts, and each department sets up a server by itself, establishes and maintains a blockchain network, and each department's own The maintained blockchains together form a blockchain architecture based on the DAG directed acyclic graph structure, covering the entir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an IOT equipment behavior credibility supervision method based on a block chain, which is based on the block chain and the Internet of Things technology and is applied to the field of the Internet of Things. Aiming at the problem that a large amount of equipment lacks an effective security protection mechanism and is prone to attack to make untrusted behaviors in the Internet of Things industry at present, an IOT equipment supervision and management network architecture based on a block chain is designed, Internet of Things nodes are supervised by using a block chain technology, the nodes making untrusted behaviors are found and processed, and the security of the Internet of Things equipment is effectively improved. The method specifically comprises the steps that a block chain is deployed on an Internet of Things platform, a verification node on the chain generates a comprehensive reputation value for a common node according to data generated when the common node works by using algorithms such as deep learning and a neural network, and the comprehensive reputation value of each node is judged by using an artificial intelligence algorithm; and untrusted behaviors generated by the nodes whose reputation value is judged to be lower than the set reputation value threshold are reported, and support is provided for subsequent corresponding management and control operations.

Description

technical field [0001] The invention relates to the technical fields of block chain and Internet of Things, and is a scheme for supervising the behavior of Internet of Things network nodes by using block chain technology. This solution generates reputation values ​​for all IoT network nodes and records them on the blockchain, reports the untrustworthy behavior of nodes that are judged to be lower than the set reputation value threshold, and provides support for subsequent corresponding management and control operations. Background technique [0002] With the advent of the era of big data, the rapid development of the Internet of Things industry has enabled the large-scale application of Internet of Things technology in many industries. Due to the large number of IoT devices, fragile computing and storage capabilities, and open environments, a large number of IoT devices are deployed in harsh environments that are unmonitored due to factors such as cost and management, and la...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/122H04W12/06H04W12/02H04W12/00G16Y20/10G16Y40/50
CPCH04W12/06H04W12/02H04W12/009G16Y20/10G16Y40/50H04L9/50
Inventor 冯云霞陈泓达李旭
Owner QINGDAO UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products