A kind of information processing method based on wireless Internet of Things
Technical field
The present invention relates to technology of Internet of things field, particularly relate to a kind of information processing method based on wireless Internet of Things.
Background technology
Internet of Things is expansion and the extension of the Internet, and this network is the information network that " all things on earth " of connecting into is controlled, safe in this world, can be applicable to all trades and professions.Usually, the equipment that Internet of Things is understood to all trades and professions is more organized into network, i.e. end Network, these end Network are connected to the Internet by suitable mode again, realize the communication any time, between any people from place and thing, between thing and thing in network, realize acquisition of information, equipment control etc.
The end Network of wireless Internet of Things is different with traditional the Internet architecture.Be provided with a large amount of gateways and router in traditional the Internet, communicated with router by gateway between network node.In the end wireless network of wireless Internet of Things, wireless network node equipment may be all very little, and by wireless connections between wireless network node, power, the disposal ability of wireless node apparatus are all very limited, network size dynamic change.In addition, under a lot of applicable cases, in end wireless network, the reliability that radio node communicates, accuracy and security requirement are very high, and can suitably relax the requirement such as validity, real-time of transfer of data.
So far, not yet have a kind of comparatively efficiently, accurately for the information processing method of wireless Internet of Things.
Summary of the invention
The present invention is exactly for the weak point in above-mentioned background technology, and a kind of information processing method based on wireless Internet of Things proposed, it has higher fail safe and efficiency.The object of the invention is to be achieved by the following technical measures.
Based on an information processing method for wireless Internet of Things, described wireless Internet of Things comprises multiple wireless sensor node, a resource information forwarding server and multiple P2P wireless terminal, it is characterized in that:
Each wireless sensor node gathers the data message of article or service in described wireless Internet of Things, and the data message of collection is sent to resource information forwarding server;
Described resource information forwarding server carries out identifying processing to the data message received from described wireless sensor node and fail safe is filtered, and described data message is forwarded to a P2P wireless terminal;
Each P2P wireless terminal reception also stores the data message that described resource information forwarding server forwards; Further, described P2P wireless terminal can read the data message stored in other P2P wireless terminals.
Further, before gathered data message is sent to described resource information forwarding server by each wireless sensor node, also need to carry out authentication between this wireless sensor node and described resource information forwarding server; Suppose that the name of computer or other computing terminals be directly connected with this wireless sensor node is called R1, the name of described resource information forwarding server is called R2, then authentication process itself is as follows:
Step U1, R2 generate a random number Q, send it to R1;
Step U2, R1 generate private key Ks and two PKI Ka and Kb after receiving the random number Q of R2 generation;
Wherein, (Ka)
2+ (Kb)
2=Q
2;
Then, PKI Ka and Kb is returned to R2 by R1;
Step U3, R2 verify it after receiving PKI Ka and Kb;
If (Ka)
2+ (Kb)
2≠ Q
2, then authentication failure, stops communication;
Otherwise Ka and Kb that use public-key respectively is encrypted Q, enciphered data E (Ka) and E (Kb) is sent to R1;
Step U4, R1 utilize private key Ks to the enciphered data E received (Ka) and E (Kb) deciphering, if decrypted result is all Q, then authentication is passed through, and shows can carry out normal transfer of data between R1 and R2; Otherwise authentication failure, stops communication.
Further, complete authentication between described wireless sensor node and described resource information forwarding server after, the data message of collection is sent to described resource information forwarding server by described wireless sensor node in the following manner, particularly:
For described wireless sensor node:
This wireless sensor node, before the data message of collection is sent to described resource information forwarding server, performs following operation:
Step M1, is divided into three sections by described data message, is respectively subdata information info1, subdata information info2 and subdata information info3, and the length of above-mentioned three cross-talk data messages is respectively k1 byte, k2 byte, k3 byte; Above-mentioned three cross-talk data messages are arranged joint in order and can obtain described data message;
Wherein, k2>k1+k3, and k3>k1;
Step M2, arranges joint in order by subdata information info1 and subdata information info3, obtains checking data information;
Step M3, calculates the MD5 value of described checking data information, obtains referential integrity check value H1;
Step M4, is sent to described resource information forwarding server jointly by described data message and control information;
Wherein, described control information comprises the value of referential integrity check value H1 and k1 and k3;
For described resource information forwarding server:
This resource information forwarding server receives from after the data message of described wireless sensor node and control information, performs following operation:
Step N1, extracts initial k1 byte and the last position k3 byte of described data message, arranges joint in order, obtain information to be verified;
Step N2, calculates the MD5 value of described information to be verified, obtains actual integrity check value H2;
Step N3, compares the referential integrity check value H1 calculated in the control information of described actual integrity check value H2 and the reception obtained; If both are identical, then described data message passes through completeness check; Otherwise, abandon described data message, and send transfer instruction again to described wireless sensor node.
Further, each P2P wireless terminal self has an adjacent visit information list, for by visiting other P2P wireless terminals with the P2P wireless terminal that it is directly connected;
Described adjacent visit information list comprises following content:
(1) address of the P2P wireless terminal be directly connected with current P2P wireless terminal;
(2) current P2P wireless terminal and with the network bandwidth between its P2P wireless terminal be directly connected;
(3) current P2P wireless terminal and with the average connection setup time between its P2P wireless terminal be directly connected;
(4) current P2P wireless terminal and with the successful connection probability between its P2P wireless terminal be directly connected;
(5) current P2P wireless terminal and with the data transfer integrity probability between its P2P wireless terminal be directly connected;
When an initial P2P wireless terminal b1 to need in accesses network a target P 2P wireless terminal bn with its indirect connection, perform following operation:
Steps A 1, is set to described initial P2P wireless terminal b1 by current P2P wireless terminal initializes;
Steps A 2, inquires about all P2P wireless terminals be directly connected with it in the adjacent visit information list of current P2P wireless terminal b1;
If find described target P 2P wireless terminal bn, then return;
Otherwise, successively current P2P wireless terminal is set to each the P2P wireless terminal be directly connected with described initial P2P wireless terminal b1; Correspondingly, steps A 3 is performed to each current P2P wireless terminal that described initial P2P wireless terminal b1 is directly connected;
Steps A 3, the adjacent visit information list of the P2P wireless terminal adopting recursive algorithm inquiry to be directly connected with current P2P wireless terminal, if find described target P 2P wireless terminal bn, then recurrence returns.
Further, if there is k bar access path L1 between initial P2P wireless terminal b1 and target P 2P wireless terminal bn, L2 ..., Lk, wherein, k be greater than 1 positive integer, then select the step of best access path as follows:
Step B1, calculates access path L1, L2 respectively ..., the summation W ' 1, W ' 2 of the network bandwidth between every two P2P wireless terminals in Lk ..., W ' k;
According to every bar access path L1, L2 ..., the linking number in Lk, calculates the averaging network bandwidth W1 of every bar access path, W2 ..., Wk;
Wherein, the P2P wireless terminal quantity that the linking number in an access path is defined as in this access path deducts 1;
Step B2, calculates access path L1, L2 respectively ..., the summation T ' 1, T ' 2 of average connection setup time between every two P2P wireless terminals in Lk ..., T ' k;
According to every bar access path L1, L2 ..., the linking number in Lk, calculates total connection setup time T1, the T2 of every bar access path ..., Tk;
Step B3, respectively by access path L1, L2 ..., the successful connection probability multiplication in Lk between every two P2P wireless terminals, what obtain every bar access path connects into power C1, C2 ..., Ck;
Step B4, respectively by access path L1, L2 ..., the data transfer integrity probability multiplication in Lk between every two P2P wireless terminals, obtains the transfer of data percentage of head rice I 1, I2 of every bar access path ..., Ik;
Step 5, according to the data obtained in above-mentioned steps, calculates access path L1, L2 respectively ..., the assessment parameter Ф 1, Ф 2 of Lk ..., Ф k, the access path selecting assessment parameter value maximum is as best access path; Particularly, the computing formula of the assessment parameter Ф i of access path Li is as follows:
Фi=lg(Wi+1)/lg(Ti+1)*(3Ci+2Ii)
2;
Wherein, i is positive integer, and 1≤i≤k.
Further, after determining described target P 2P wireless terminal bn, carry out transfer of data between described initial P2P wireless terminal b1 and target P 2P wireless terminal bn before, also comprise authentication process itself, specific as follows:
Step V1, bn generate a random number R, send it to b1;
Step V2, b1 generate private key Ks and two PKI Kp1 and Kp2 after receiving the random number R of bn generation;
Wherein, (Kp1)
2+ (Kp2)
2=R
2;
Then, PKI Kp1 and Kp2 is returned to bn by b1;
Step V3, bn verify it after receiving PKI Kp1 and Kp2, if (Kp1)
2+ (Kp2)
2≠ R
2, then authentication failure, stops communication; Otherwise Kp1 and Kp2 that use public-key respectively is encrypted R, enciphered data E (Kp1) and E (Kp2) is sent to b1;
Step V4, b1 utilize private key Ks to the enciphered data E received (Kp1) and E (Kp2) deciphering, if decrypted result is all R, then authentication is passed through, and shows can carry out normal transfer of data between b1 and bn; Otherwise authentication failure, stops communication.
Further, performing in the authentication process itself between described initial P2P wireless terminal b1 and target P 2P wireless terminal bn, in order to Information Security object, need to perform completeness check to the data message transmitted between the two; The name of tentation data transmit leg is called R1, and the name of data receiver is called R2, then above-mentioned integrity check process is as follows:
Described data receiver R1 performs following operation:
Step I1, is divided into three sections by data message to be sent, is respectively subdata information info1, subdata information info2 and subdata information info3, and the length of above-mentioned three cross-talk data is respectively k1 byte, k2 byte, k3 byte; Above-mentioned three cross-talk data messages are arranged in order the data message engaging and can transmit;
Wherein, k2>k1+k3, and k3=[log
2(k1)], symbol [] represents the computing of intercepting integer part;
Step I2, arranges joint in order by subdata information info1 and subdata information info3, obtains checking data information;
Step I3, calculates the MD5 value of described checking data information, obtains referential integrity check value H1;
Step I4, is sent to described data receiver R2 jointly by described data message and control information;
Wherein, described control information comprises the value of referential integrity check value H1 and k1 and k3;
After described data receiver R2 receives described data message and control information, perform following operation:
Step J1, extracts initial k1 byte and the last position k3 byte of described data message, arranges joint in order, obtain information to be verified;
Step J2, calculates the MD5 value of described information to be verified, obtains actual integrity check value H2;
Step J3, compares the referential integrity check value H1 calculated in the control information of described actual integrity check value H2 and the reception obtained; If both are identical, then described data message passes through completeness check; Otherwise, described data message is abandoned, and sends transfer instruction again to described data receiver R1.
Compared with prior art, there is following advantage in technical scheme of the present invention:
The first, technical scheme of the present invention has used the safe practice of identity-based checking and data integrity verifying, substantially increases the safety and reliability of transfer of data between data acquisition end in wireless Internet of Things, server end and P2P wireless terminal;
The second, technical scheme of the present invention, for the selection course of routed path distributed in wireless Internet of Things, combines various factors, makes the Path selection in wireless Internet of Things more reasonable.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, technical scheme of the present invention is further detailed.In the accompanying drawings, identical functional module is represented with identical Reference numeral.Described accompanying drawing only for illustrating the object of preferred implementation, and does not think limitation of the present invention.
Fig. 1 shows system construction drawing according to an embodiment of the invention.
Embodiment
By hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Described description is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of specification, and in order to above and other objects of the present invention, feature and advantage can be become apparent.
Fig. 1 is the system construction drawing according to the embodiment of the present invention.
With reference to shown in Fig. 1, a kind of information processing method based on wireless Internet of Things, described wireless Internet of Things comprises multiple wireless sensor node, a resource information forwarding server and multiple P2P wireless terminal, it is characterized in that:
Each wireless sensor node gathers the data message of article or service in described wireless Internet of Things, and the data message of collection is sent to resource information forwarding server;
Described resource information forwarding server carries out identifying processing to the data message received from described wireless sensor node and fail safe is filtered, and described data message is forwarded to a P2P wireless terminal;
Each P2P wireless terminal reception also stores the data message that described resource information forwarding server forwards; Further, described P2P wireless terminal can read the data message stored in other P2P wireless terminals.
Further, before gathered data message is sent to described resource information forwarding server by each wireless sensor node, also need to carry out authentication between this wireless sensor node and described resource information forwarding server; Suppose that the name of computer or other computing terminals be directly connected with this wireless sensor node is called R1, the name of described resource information forwarding server is called R2, then authentication process itself is as follows:
Step U1, R2 generate a random number Q, send it to R1;
Step U2, R1 generate private key Ks and two PKI Ka and Kb after receiving the random number Q of R2 generation;
Wherein, (Ka)
2+ (Kb)
2=Q
2;
Then, PKI Ka and Kb is returned to R2 by R1;
Step U3, R2 verify it after receiving PKI Ka and Kb;
If (Ka)
2+ (Kb)
2≠ Q
2, then authentication failure, stops communication;
Otherwise Ka and Kb that use public-key respectively is encrypted Q, enciphered data E (Ka) and E (Kb) is sent to R1;
Step U4, R1 utilize private key Ks to the enciphered data E received (Ka) and E (Kb) deciphering, if decrypted result is all Q, then authentication is passed through, and shows can carry out normal transfer of data between R1 and R2; Otherwise authentication failure, stops communication.
Further, complete authentication between described wireless sensor node and described resource information forwarding server after, the data message of collection is sent to described resource information forwarding server by described wireless sensor node in the following manner, particularly:
For described wireless sensor node:
This wireless sensor node, before the data message of collection is sent to described resource information forwarding server, performs following operation:
Step M1, is divided into three sections by described data message, is respectively subdata information info1, subdata information info2 and subdata information info3, and the length of above-mentioned three cross-talk data messages is respectively k1 byte, k2 byte, k3 byte; Above-mentioned three cross-talk data messages are arranged joint in order and can obtain described data message;
Wherein, k2>k1+k3, and k3>k1;
Step M2, arranges joint in order by subdata information info1 and subdata information info3, obtains checking data information;
Step M3, calculates the MD5 value of described checking data information, obtains referential integrity check value H1;
Step M4, is sent to described resource information forwarding server jointly by described data message and control information;
Wherein, described control information comprises the value of referential integrity check value H1 and k1 and k3;
For described resource information forwarding server:
This resource information forwarding server receives from after the data message of described wireless sensor node and control information, performs following operation:
Step N1, extracts initial k1 byte and the last position k3 byte of described data message, arranges joint in order, obtain information to be verified;
Step N2, calculates the MD5 value of described information to be verified, obtains actual integrity check value H2;
Step N3, compares the referential integrity check value H1 calculated in the control information of described actual integrity check value H2 and the reception obtained; If both are identical, then described data message passes through completeness check; Otherwise, abandon described data message, and send transfer instruction again to described wireless sensor node.
Further, each P2P wireless terminal self has an adjacent visit information list, for by visiting other P2P wireless terminals with the P2P wireless terminal that it is directly connected;
Described adjacent visit information list comprises following content:
(1) address of the P2P wireless terminal be directly connected with current P2P wireless terminal;
(2) current P2P wireless terminal and with the network bandwidth between its P2P wireless terminal be directly connected;
(3) current P2P wireless terminal and with the average connection setup time between its P2P wireless terminal be directly connected;
(4) current P2P wireless terminal and with the successful connection probability between its P2P wireless terminal be directly connected;
(5) current P2P wireless terminal and with the data transfer integrity probability between its P2P wireless terminal be directly connected;
When an initial P2P wireless terminal b1 to need in accesses network a target P 2P wireless terminal bn with its indirect connection, perform following operation:
Steps A 1, is set to described initial P2P wireless terminal b1 by current P2P wireless terminal initializes;
Steps A 2, inquires about all P2P wireless terminals be directly connected with it in the adjacent visit information list of current P2P wireless terminal b1;
If find described target P 2P wireless terminal bn, then return;
Otherwise, successively current P2P wireless terminal is set to each the P2P wireless terminal be directly connected with described initial P2P wireless terminal b1; Correspondingly, steps A 3 is performed to each current P2P wireless terminal that described initial P2P wireless terminal b1 is directly connected;
Steps A 3, the adjacent visit information list of the P2P wireless terminal adopting recursive algorithm inquiry to be directly connected with current P2P wireless terminal, if find described target P 2P wireless terminal bn, then recurrence returns.
Further, if there is k bar access path L1 between initial P2P wireless terminal b1 and target P 2P wireless terminal bn, L2 ..., Lk, wherein, k be greater than 1 positive integer, then select the step of best access path as follows:
Step B1, calculates access path L1, L2 respectively ..., the summation W ' 1, W ' 2 of the network bandwidth between every two P2P wireless terminals in Lk ..., W ' k;
According to every bar access path L1, L2 ..., the linking number in Lk, calculates the averaging network bandwidth W1 of every bar access path, W2 ..., Wk;
Wherein, the P2P wireless terminal quantity that the linking number in an access path is defined as in this access path deducts 1;
Step B2, calculates access path L1, L2 respectively ..., the summation T ' 1, T ' 2 of average connection setup time between every two P2P wireless terminals in Lk ..., T ' k;
According to every bar access path L1, L2 ..., the linking number in Lk, calculates total connection setup time T1, the T2 of every bar access path ..., Tk;
Step B3, respectively by access path L1, L2 ..., the successful connection probability multiplication in Lk between every two P2P wireless terminals, what obtain every bar access path connects into power C1, C2 ..., Ck;
Step B4, respectively by access path L1, L2 ..., the data transfer integrity probability multiplication in Lk between every two P2P wireless terminals, obtains the transfer of data percentage of head rice I 1, I2 of every bar access path ..., Ik;
Step 5, according to the data obtained in above-mentioned steps, calculates access path L1, L2 respectively ..., the assessment parameter Ф 1, Ф 2 of Lk ..., Ф k, the access path selecting assessment parameter value maximum is as best access path; Particularly, the computing formula of the assessment parameter Ф i of access path Li is as follows:
Фi=lg(Wi+1)/lg(Ti+1)*(3Ci+2Ii)
2;
Wherein, i is positive integer, and 1≤i≤k.
Further, after determining described target P 2P wireless terminal bn, carry out transfer of data between described initial P2P wireless terminal b1 and target P 2P wireless terminal bn before, also comprise authentication process itself, specific as follows:
Step V1, bn generate a random number R, send it to b1;
Step V2, b1 generate private key Ks and two PKI Kp1 and Kp2 after receiving the random number R of bn generation;
Wherein, (Kp1)
2+ (Kp2)
2=R
2;
Then, PKI Kp1 and Kp2 is returned to bn by b1;
Step V3, bn verify it after receiving PKI Kp1 and Kp2, if (Kp1)
2+ (Kp2)
2≠ R
2, then authentication failure, stops communication; Otherwise Kp1 and Kp2 that use public-key respectively is encrypted R, enciphered data E (Kp1) and E (Kp2) is sent to b1;
Step V4, b1 utilize private key Ks to the enciphered data E received (Kp1) and E (Kp2) deciphering, if decrypted result is all R, then authentication is passed through, and shows can carry out normal transfer of data between b1 and bn; Otherwise authentication failure, stops communication.
Further, performing in the authentication process itself between described initial P2P wireless terminal b1 and target P 2P wireless terminal bn, in order to Information Security object, need to perform completeness check to the data message transmitted between the two; The name of tentation data transmit leg is called R1, and the name of data receiver is called R2, then above-mentioned integrity check process is as follows:
Described data receiver R1 performs following operation:
Step I1, is divided into three sections by data message to be sent, is respectively subdata information info1, subdata information info2 and subdata information info3, and the length of above-mentioned three cross-talk data is respectively k1 byte, k2 byte, k3 byte; Above-mentioned three cross-talk data messages are arranged in order the data message engaging and can transmit;
Wherein, k2>k1+k3, and k3=[log
2(k1)], symbol [] represents the computing of intercepting integer part;
Step I2, arranges joint in order by subdata information info1 and subdata information info3, obtains checking data information;
Step I3, calculates the MD5 value of described checking data information, obtains referential integrity check value H1;
Step I4, is sent to described data receiver R2 jointly by described data message and control information;
Wherein, described control information comprises the value of referential integrity check value H1 and k1 and k3;
After described data receiver R2 receives described data message and control information, perform following operation:
Step J1, extracts initial k1 byte and the last position k3 byte of described data message, arranges joint in order, obtain information to be verified;
Step J2, calculates the MD5 value of described information to be verified, obtains actual integrity check value H2;
Step J3, compares the referential integrity check value H1 calculated in the control information of described actual integrity check value H2 and the reception obtained; If both are identical, then described data message passes through completeness check; Otherwise, described data message is abandoned, and sends transfer instruction again to described data receiver R1.
In sum; be only the present invention's preferably embodiment, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.