CN108683492B - Credible wireless sensor and control method - Google Patents
Credible wireless sensor and control method Download PDFInfo
- Publication number
- CN108683492B CN108683492B CN201810398711.7A CN201810398711A CN108683492B CN 108683492 B CN108683492 B CN 108683492B CN 201810398711 A CN201810398711 A CN 201810398711A CN 108683492 B CN108683492 B CN 108683492B
- Authority
- CN
- China
- Prior art keywords
- module
- program
- trusted
- data acquisition
- trusted computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000012545 processing Methods 0.000 claims abstract description 71
- 238000004891 communication Methods 0.000 claims abstract description 45
- 238000005259 measurement Methods 0.000 claims description 21
- 230000007958 sleep Effects 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 5
- 239000000284 extract Substances 0.000 claims description 3
- 238000004886 process control Methods 0.000 claims description 2
- 239000007787 solid Substances 0.000 abstract description 4
- 230000005540 biological transmission Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000006243 chemical reaction Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013480 data collection Methods 0.000 description 1
- 230000019371 dormancy process Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a trusted wireless sensor and a control method, wherein a trusted computing module of the trusted wireless sensor acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module to compute a metric value, compares the metric value with a preset value and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the wireless communication module transmits sensing data in a sensor network formed among a plurality of credible wireless sensors. The credible wireless sensor and the control method provided by the invention can protect the integrity of software and hardware of the wireless sensor, realize the enhancement of the safety of the wireless sensor body and lay a solid foundation for constructing a safe and credible wireless sensor network.
Description
Technical Field
The invention relates to the field of power communication, in particular to a trusted wireless sensor and a control method.
Background
A Wireless Sensor Network (WSN) is a distributed sensing network whose distal end is a Sensor that can sense and inspect the outside world. The sensors communicate in a wireless mode, so that the network setting is flexible, the position of the equipment can be changed at any time, and a multi-hop self-organizing network is formed in a wireless communication mode. The sensor types in the wireless sensor network mainly comprise sensor nodes, sink nodes and management nodes. The composition and function of the wireless sensor comprise the following four basic units: the device comprises a sensing unit (consisting of a sensor and an analog-digital conversion functional module), a processing unit (consisting of an embedded system, including a CPU, a memory, an embedded operating system and the like), a communication unit (consisting of a wireless communication module) and a power supply part.
Wireless sensor technology has been widely applied in various internet of things scenes including power systems. However, the existing wireless sensor is often designed with consideration of more functional performance requirements and neglects information security protection, and a corresponding security protection verification means is not set for the wireless sensor, so that an attacker may conveniently acquire confidential information of the wireless sensor and modify program codes in the sensing node, for example, the sensing node has a plurality of identity IDs, thereby communicating in the sensor network with a plurality of identities, and in addition, the attacker may also forge or pretend to be a legitimate node to join in the sensing network by acquiring information such as keys and codes stored in the wireless sensor. Once a part of nodes in the sensor network are controlled, an attacker can launch many kinds of attacks, such as monitoring information transmitted in the sensor network, issuing false routing information or transmitting false sensing information to the sensor network, performing denial of service attacks, and the like.
Disclosure of Invention
Therefore, the invention provides a trusted wireless sensor network architecture and a control method, which can ensure the integrity of software and hardware of a wireless sensor and solve the problem that the information of the wireless sensor network is monitored or false information is transmitted.
The embodiment of the invention provides a credible wireless sensor, which comprises: trusted computing module, processing control module, data acquisition module, wireless communication module, wherein: the trusted computing module acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module, computes metric values of the program data in the data acquisition module, the wireless communication module, the processing control module and the processing control module according to the hardware serial numbers and the program data, compares the metric values with a preset value, and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the processing control module transmits the sensing data through a sensor network formed by the wireless communication module among the plurality of trusted wireless sensors.
Further, the trusted computing module comprises: the cryptography service submodule is used for acquiring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module, acquiring program data in the processing control module, generating a hardware metric value according to the hardware serial numbers, and performing hash calculation on the program data to obtain a program metric value; and the integrity storage and measurement submodule is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating the control instruction according to a comparison result.
Further, the integrity storage and measurement submodule is specifically configured to: measuring first program data in the processing control module to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module to obtain a hardware metric value, and comparing the hardware metric value with a second preset value; and when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value, generating the control instruction.
Further, the process control module includes: the microprocessor judges whether the sensing data sent by the data acquisition module is received within preset time; if the microprocessor does not receive the sensing data sent by the data acquisition module within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module to perform trusted computing; the trusted computing module calculates a program metric value of a second program in the volatile memory and stores the program metric value of the second program;
and the microprocessor stores the second program into the nonvolatile memory and enables the data acquisition module to enter a sleep state according to the sleep instruction.
Further, the data acquisition module receives a wake-up instruction sent by the microprocessor; the trusted computing module extracts the second program from the nonvolatile memory to perform trusted computing, and judges whether a program metric value of the second program is consistent with a third preset value; if the program metric value of the second program is consistent with a third preset value, the trusted computing module feeds back a trusted computing success result to the microprocessor; and the microprocessor loads the second program to the volatile memory according to the trusted computing success result and wakes up the data acquisition module.
Further, if the program metric value of the second program is inconsistent with a third preset value, the trusted computing module feeds back a trusted computing failure result to the microprocessor; and the microprocessor resets the data acquisition module according to the trusted computing failure result.
Further, the trusted computing module further comprises: and the platform data protection sub-module is used for storing the hardware metric value and the program metric value.
Further, the trusted computing module further comprises: and the identity identification submodule is used for providing an identity identification key, the trusted computing module carries out identity verification on the data acquisition module according to the requirements of a communication protocol, and the processing control module receives and processes the data sent by the data acquisition module after the verification is passed.
Further, the trusted wireless sensor further comprises: and the energy supply module is used for providing power for the trusted computing module, the processing control module, the data acquisition module and the wireless communication module.
The embodiment of the invention also provides a control method of the credible wireless sensor, which comprises the following steps: acquiring a hardware serial number and program data of a target object to be verified, calculating a metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control instruction according to a comparison result; acquiring the control instruction, and generating a starting instruction according to the control instruction; and acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of trusted wireless sensors.
The technical scheme of the invention has the following advantages:
the embodiment of the invention provides a trusted wireless sensor and a control method, wherein a trusted computing module of the trusted wireless sensor acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module to compute a metric value, compares the metric value with a preset value and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the wireless communication module transmits sensing data in a sensor network formed among a plurality of credible wireless sensors. According to the trusted wireless sensor and the control method provided by the invention, trusted calculation is carried out before the wireless sensor is used for data transmission, and data transmission is carried out under the condition that the wireless sensor is determined to be trusted, so that the software and hardware integrity of the wireless sensor can be protected, the security of a wireless sensor body is enhanced, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a composition diagram of a specific example of a trusted wireless sensor provided in an embodiment of the present invention;
FIG. 2 is a block diagram of another specific example of a trusted wireless sensor provided in an embodiment of the present invention;
FIG. 3 is a sleep flow diagram for providing a trusted wireless sensor in an embodiment of the present invention;
FIG. 4 is a wake-up flow diagram for providing a trusted wireless sensor in an embodiment of the present invention;
fig. 5 is a flowchart of a specific example of a control method for providing a trusted wireless sensor in an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
An embodiment of the present invention provides a trusted wireless sensor, as shown in fig. 1, the trusted wireless sensor includes: the device comprises a trusted computing module 1, a processing control module 2, a data acquisition module 3 and a wireless communication module 4.
Optionally, in some embodiments of the present invention, a plurality of trusted wireless sensors may establish communication connection through the wireless communication module 4, thereby constructing a wireless transmission network. When a trusted wireless sensor in the wireless transmission network needs to work, firstly, the trusted computing module 1 acquires the hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and program data of the processing control module 2, computes the program metric values of the processing control module 2, the data acquisition module 3, the wireless communication module 4 and the processing control module 2 according to the hardware serial numbers and the program data, compares the metric values with preset values, and generates a control instruction according to the comparison result. In a preferred embodiment, as shown in fig. 2, the trusted computing module 1 comprises:
and the cryptography service sub-module 11 is configured to acquire respective hardware serial numbers of the processing control module 2, the data acquisition module 3, and the wireless communication module 4, acquire program data in the processing control module 2, generate a hardware metric value according to the hardware serial numbers, and perform hash calculation on the program data to obtain the program metric value. In a preferred embodiment, the cryptography service sub-module 11 can also provide encryption and public key cryptography for data to ensure the security and reliability of the data.
And the platform data protection sub-module 12 is used for storing the hardware metric value and the program metric value. In the embodiment of the present invention, the platform data protection sub-module 12 includes a Platform Configuration Register (PCR) for storing the metric value of the metric object.
And the integrity storage and measurement submodule 13 is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating a control instruction according to the comparison result. In the embodiment of the invention, the integrity storage and measurement sub-module 13 stores the integrity preset value of each measurement object, integrity measurement is carried out on the hardware of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and the program in the processing control module 2, the trusted computing module 1 judges the integrity of the software and the hardware of the trusted wireless sensor according to the comparison of the preset value and the measurement value, and can send instructions of starting, resetting, recovering and the like to the processing control module according to the judgment result, thereby carrying out safety protection.
In a preferred embodiment, the integrity storage and measurement submodule 13 is specifically configured to: measuring first program data in the processing control module 2 to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 to obtain a hardware metric value, and comparing the hardware metric value with a second preset value;
and generating a control instruction when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value. In the embodiment of the invention, when the measurement value of the program measurement value hardware is consistent with the corresponding preset value, the software and the hardware of the trusted sensor are complete and safe, and then a control instruction can be issued to the processing control module 2 to perform subsequent data processing work.
In the embodiment of the present invention, the starting process of the trusted wireless sensor includes: after the trusted wireless sensor is powered on or reset, the trusted computing module 1 performs integrity measurement on a starting program in the processing control module 2, when the starting program is consistent with a preset value, the processing control module 2 loads and runs the starting program, the measurement program in the starting program performs integrity measurement on a main program by using the trusted computing module 1, when the measurement value of the main program is consistent with the preset value, the processing control module 2 loads and runs the main program, and the starting process is ended. In the embodiment of the invention, the hardware serial numbers of all modules are recorded in the starting program, when the serial numbers of all modules are consistent with the preset value, the hardware is complete and reliable, the trusted wireless sensor can be safely started, and the main program uses the hardware with the corresponding serial numbers to perform data processing.
And the identity identification submodule 14 is used for providing an identity identification key and providing the identity identification key, the trusted computing module 1 performs identity authentication on the data acquisition module 3 according to the requirements of the communication protocol, and the processing control module 2 receives and processes the data sent by the data acquisition module 3 after the authentication is passed. In the embodiment of the present invention, the identity identification submodule 14 ensures the security of the acquired data by identifying the identity of the data acquisition module 3, the working principle thereof conforms to the relevant regulations of the national relevant trusted cryptographic module standard, and a person skilled in the art can verify the identity of the data acquisition module 3 according to the prior art.
The processing control module 2 receives the control instruction sent by the trusted computing module 1, and generates a starting instruction according to the control instruction so as to start the data acquisition module 3 and the wireless communication module 4. In the embodiment of the present invention, the processing control module 2 is a core module for executing business calculation and functions, and includes a microprocessor 21, a volatile memory 22, and a nonvolatile memory 23, and can receive a relevant instruction from the trusted computing module 1, and receive the data acquisition module 3 and the wireless communication module 4 for processing according to the needs of an actual application scenario.
The data acquisition module 3 acquires sensing data and sends the sensing data to the processing control module 2; in the embodiment of the present invention, the data acquisition module 3 includes a sensing submodule 31 and an a/D conversion submodule 32, and the sensing submodule 31 converts the acquired data into a digital signal through the a/D conversion submodule 32, and then sends the digital signal to the processing control module 2.
The processing control module 2 transmits sensing data through a sensor network formed among a plurality of credible wireless sensors through the wireless communication module 4. In the embodiment of the present invention, the wireless communication module includes a wireless transceiver 41 and a network protocol 42, and the wireless transceiver 41 transmits and receives data according to the network protocol 42 and the processing control module 2.
In practical applications, when the trusted wireless sensor is not required to acquire data within a preset time or the processing control module 2 does not receive the sensing data sent by the data acquisition module 3 within a preset time range, the trusted wireless sensor can be dormant, in an embodiment of the present invention, as shown in fig. 3, a dormancy process of the trusted wireless sensor includes:
step S11, the microprocessor 21 judges whether the sensing data sent by the data acquisition module 3 is received within the preset time;
and step S12, if the microprocessor 21 does not receive the sensing data sent by the data acquisition module 3 within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module 1 to perform trusted computing.
Step S13: the trusted computing module 1 computes a program metric value for the second program in the volatile memory 22 and stores the program metric value for the second program.
Step S14: the microprocessor 21 stores the second program in the nonvolatile memory 23, and causes the data collection module 3 to enter a sleep state according to the sleep instruction.
In practical application, the processing control module 2 wakes up the trusted wireless sensor entering the sleep state periodically according to application needs, or listens to the wireless communication module 4, and wakes up when a trigger event is found, in an embodiment of the present invention, as shown in fig. 4, a wake-up process of the trusted wireless sensor includes:
step S21, the data acquisition module 3 receives the awakening instruction sent by the microprocessor 21;
in step S22, the trusted computing module 1 extracts the second program from the nonvolatile memory 23 for trusted computing, and determines whether the program metric value of the second program is consistent with a third preset value.
In step S23, if the program metric of the second program is consistent with the third preset value, the trusted computing module 1 feeds back a successful result of trusted computing to the microprocessor 21.
And step S24, the microprocessor 21 loads the second program into the volatile memory 22 according to the trusted computing success result and wakes up the data acquisition module 3.
Step S25, if the program metric value of the second program is inconsistent with the third preset value, the trusted computing module 1 feeds back a trusted computing failure result to the microprocessor 21; the microprocessor 21 resets the data acquisition module 3 according to the trusted computing failure result.
In a preferred embodiment, the trusted wireless sensor further comprises: and the energy supply module 5 is used for supplying power to the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4. In the embodiment of the invention, a battery power supply mode is adopted, the standard voltage is 5V, and power supply support is provided for the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4.
According to the trusted wireless sensor provided by the embodiment of the invention, the measurement values of the software and the hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent processes of wireless sensing data acquisition, processing, transmission and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Example 2
An embodiment of the present invention provides a method for controlling a trusted wireless sensor, as shown in fig. 5, the method for controlling a trusted wireless sensor specifically includes the following steps:
and step S1, acquiring the hardware serial number and the program data of the target object to be verified, calculating the metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control command according to the comparison result. In the embodiment of the present invention, the target object to be verified is each module and program data of the trusted wireless sensor in embodiment 1, and a specific process may correspond to a function implemented by the trusted computing module in embodiment 1, which is not described herein again.
And step S2, acquiring a control instruction and generating a starting instruction according to the control instruction. In this embodiment of the present invention, a specific process of generating the start instruction according to the control instruction may correspond to a function implemented by the processing control module in embodiment 1, which is not described herein again.
And step S3, acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of credible wireless sensors. In the embodiment of the present invention, the specific process of acquiring the sensing data and transmitting the sensing data through the sensor network formed among the plurality of trusted wireless sensors may correspond to the functions implemented by the processing control module, the data acquisition module, and the wireless communication module in embodiment 1, and will not be described herein again.
According to the trusted wireless sensor control method provided by the embodiment of the invention, the measurement values of software and hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent steps of wireless sensor data acquisition, processing, sending and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.
Claims (7)
1. A trusted wireless sensor, comprising: trusted computing module, processing control module, data acquisition module, wireless communication module, wherein:
the trusted computing module acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module, computes hardware metric values of the data acquisition module, the wireless communication module and the processing control module according to the hardware serial numbers, computes program metric values of the program data in the processing control module according to the program data, compares the hardware metric values and the program metric values with preset values, and generates a control instruction according to a comparison result;
the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module;
the data acquisition module acquires sensing data and sends the sensing data to the processing control module;
the processing control module transmits the sensing data through a sensor network formed among the plurality of trusted wireless sensors through the wireless communication module;
the process control module includes: volatile memory, non-volatile memory and a microprocessor,
the microprocessor judges whether the sensing data sent by the data acquisition module is received within a preset time;
if the microprocessor does not receive the sensing data sent by the data acquisition module within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module to perform trusted computing;
the trusted computing module calculates a program metric value of a second program in the volatile memory and stores the program metric value of the second program;
the microprocessor stores the second program into the nonvolatile memory and enables the data acquisition module to enter a sleep state according to the sleep instruction;
the data acquisition module receives a wake-up instruction sent by the microprocessor;
the trusted computing module extracts the second program from the nonvolatile memory to perform trusted computing, and judges whether a program metric value of the second program is consistent with a third preset value;
if the program metric value of the second program is consistent with a third preset value, the trusted computing module feeds back a trusted computing success result to the microprocessor;
and the microprocessor loads the second program to the volatile memory according to the trusted computing success result and wakes up the data acquisition module.
2. The trusted wireless sensor of claim 1, wherein the trusted computing module comprises:
the cryptography service submodule is used for acquiring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module, acquiring program data in the processing control module, generating a hardware metric value according to the hardware serial numbers, and performing hash calculation on the program data to obtain a program metric value;
and the integrity storage and measurement submodule is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating the control instruction according to a comparison result.
3. The trusted wireless sensor of claim 2, wherein the integrity storage and measurement submodule is specifically configured to:
measuring first program data in the processing control module to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module to obtain a hardware metric value, and comparing the hardware metric value with a second preset value;
and when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value, generating the control instruction.
4. The trusted wireless sensor of claim 2, wherein the trusted computing module further comprises: and the platform data protection sub-module is used for storing the hardware metric value and the program metric value.
5. The trusted wireless sensor of claim 2, wherein the trusted computing module further comprises: and the identity identification submodule is used for providing an identity identification key, the trusted computing module carries out identity verification on the data acquisition module according to the requirements of a communication protocol, and the processing control module receives and processes the data sent by the data acquisition module after the verification is passed.
6. The trusted wireless sensor of claim 1, wherein if the program metric value of the second program is inconsistent with a third predetermined value, the trusted computing module feeds back a trusted computing failure result to the microprocessor; and the microprocessor resets the data acquisition module according to the trusted computing failure result.
7. The trusted wireless sensor of claim 1, further comprising: and the energy supply module is used for providing power for the trusted computing module, the processing control module, the data acquisition module and the wireless communication module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810398711.7A CN108683492B (en) | 2018-04-28 | 2018-04-28 | Credible wireless sensor and control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810398711.7A CN108683492B (en) | 2018-04-28 | 2018-04-28 | Credible wireless sensor and control method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108683492A CN108683492A (en) | 2018-10-19 |
CN108683492B true CN108683492B (en) | 2021-09-03 |
Family
ID=63802672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810398711.7A Active CN108683492B (en) | 2018-04-28 | 2018-04-28 | Credible wireless sensor and control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108683492B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232417A (en) * | 2007-01-25 | 2008-07-30 | 上海研祥智能科技有限公司 | Embedded type wireless sensing network intelligent platform |
CN101945385A (en) * | 2010-09-10 | 2011-01-12 | 华南农业大学 | Credible wireless sensor network node and control method thereof |
CN103136485A (en) * | 2011-11-28 | 2013-06-05 | 联想(北京)有限公司 | Method of realizing computer safety and computer |
CN103716797A (en) * | 2009-03-06 | 2014-04-09 | 交互数字专利控股公司 | Platform validation and management of wireless devices |
CN105608386A (en) * | 2016-03-11 | 2016-05-25 | 成都三零嘉微电子有限公司 | Trusted computing terminal integrity measuring and proving method and device |
CN106575345A (en) * | 2014-09-23 | 2017-04-19 | 英特尔公司 | Technologies for verifying components |
CN107680636A (en) * | 2016-08-02 | 2018-02-09 | 四川智康科技有限责任公司 | A kind of clinical information processing system and method based on metadata |
CN107851150A (en) * | 2015-07-20 | 2018-03-27 | 英特尔公司 | The technology that secure hardware and software for credible I/O prove |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8832461B2 (en) * | 2010-06-25 | 2014-09-09 | Microsoft Corporation | Trusted sensors |
US10303900B2 (en) * | 2015-07-20 | 2019-05-28 | Intel Corporation | Technologies for secure programming of a cryptographic engine for trusted I/O |
-
2018
- 2018-04-28 CN CN201810398711.7A patent/CN108683492B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232417A (en) * | 2007-01-25 | 2008-07-30 | 上海研祥智能科技有限公司 | Embedded type wireless sensing network intelligent platform |
CN103716797A (en) * | 2009-03-06 | 2014-04-09 | 交互数字专利控股公司 | Platform validation and management of wireless devices |
CN101945385A (en) * | 2010-09-10 | 2011-01-12 | 华南农业大学 | Credible wireless sensor network node and control method thereof |
CN103136485A (en) * | 2011-11-28 | 2013-06-05 | 联想(北京)有限公司 | Method of realizing computer safety and computer |
CN106575345A (en) * | 2014-09-23 | 2017-04-19 | 英特尔公司 | Technologies for verifying components |
CN107851150A (en) * | 2015-07-20 | 2018-03-27 | 英特尔公司 | The technology that secure hardware and software for credible I/O prove |
CN105608386A (en) * | 2016-03-11 | 2016-05-25 | 成都三零嘉微电子有限公司 | Trusted computing terminal integrity measuring and proving method and device |
CN107680636A (en) * | 2016-08-02 | 2018-02-09 | 四川智康科技有限责任公司 | A kind of clinical information processing system and method based on metadata |
Also Published As
Publication number | Publication date |
---|---|
CN108683492A (en) | 2018-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109903433B (en) | Access control system and access control method based on face recognition | |
US8799652B2 (en) | Method for activating a network node | |
US7302252B2 (en) | Authentication systems, wireless communication terminals, and wireless base stations | |
US8909931B2 (en) | Server authentication system, server authentication method, and program for server authentication | |
CN102576397B (en) | The checking of token and data integrity protection | |
KR101048509B1 (en) | Method and apparatus for detecting civil attack node using location information and hash chain in ubiquitous sensor network | |
CN104751032A (en) | Authentication method and authentication device | |
CN107845171B (en) | Method and system for unlocking Internet of things intelligent lock by using wearable device | |
US8307055B2 (en) | Secure platform management device | |
CN104303583A (en) | System and method for establishing a secure connection in communications systems | |
CN114302389B (en) | Authentication and key agreement method, gateway, sensor and electronic equipment | |
Lee et al. | Flexicast: Energy-efficient software integrity checks to build secure industrial wireless active sensor networks | |
CN111131144B (en) | IoT (Internet of things) equipment management method, device, server and storage medium | |
KR20090059573A (en) | Entity authentication method and key management method in usn, and recording medium storing program including the same | |
CN104994085B (en) | Identity identifying method and system in a kind of wireless sensor network | |
CN108683492B (en) | Credible wireless sensor and control method | |
CN103560998A (en) | Method and system for wireless sensor network to resist DoS attacks | |
CN111818083A (en) | Information security collection and interaction system based on cloud server | |
EP3213509B1 (en) | Method for verifying positions of a plurality of monitoring devices | |
KR100932905B1 (en) | Sensing data relay apparatus and method, Sensing data management apparatus and method, Sensor network system thereof | |
CN110910141A (en) | Transaction processing method, system, device, equipment and computer readable storage medium | |
CN109963277A (en) | Super low-power consumption Internet of Things application module | |
WO2018076299A1 (en) | Data transmission method and device | |
US20090150670A1 (en) | Communication node authentication system and method, and communication node authentication program | |
WO2022031699A1 (en) | Encrypted response timing for presence detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |