CN108683492B - Credible wireless sensor and control method - Google Patents

Credible wireless sensor and control method Download PDF

Info

Publication number
CN108683492B
CN108683492B CN201810398711.7A CN201810398711A CN108683492B CN 108683492 B CN108683492 B CN 108683492B CN 201810398711 A CN201810398711 A CN 201810398711A CN 108683492 B CN108683492 B CN 108683492B
Authority
CN
China
Prior art keywords
module
program
trusted
data acquisition
trusted computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810398711.7A
Other languages
Chinese (zh)
Other versions
CN108683492A (en
Inventor
安宁钰
赵保华
王志皓
梁潇
韩兆刚
王树才
吴向东
陈孝明
全江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Hubei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Hubei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Global Energy Interconnection Research Institute, State Grid Hubei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810398711.7A priority Critical patent/CN108683492B/en
Publication of CN108683492A publication Critical patent/CN108683492A/en
Application granted granted Critical
Publication of CN108683492B publication Critical patent/CN108683492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a trusted wireless sensor and a control method, wherein a trusted computing module of the trusted wireless sensor acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module to compute a metric value, compares the metric value with a preset value and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the wireless communication module transmits sensing data in a sensor network formed among a plurality of credible wireless sensors. The credible wireless sensor and the control method provided by the invention can protect the integrity of software and hardware of the wireless sensor, realize the enhancement of the safety of the wireless sensor body and lay a solid foundation for constructing a safe and credible wireless sensor network.

Description

Credible wireless sensor and control method
Technical Field
The invention relates to the field of power communication, in particular to a trusted wireless sensor and a control method.
Background
A Wireless Sensor Network (WSN) is a distributed sensing network whose distal end is a Sensor that can sense and inspect the outside world. The sensors communicate in a wireless mode, so that the network setting is flexible, the position of the equipment can be changed at any time, and a multi-hop self-organizing network is formed in a wireless communication mode. The sensor types in the wireless sensor network mainly comprise sensor nodes, sink nodes and management nodes. The composition and function of the wireless sensor comprise the following four basic units: the device comprises a sensing unit (consisting of a sensor and an analog-digital conversion functional module), a processing unit (consisting of an embedded system, including a CPU, a memory, an embedded operating system and the like), a communication unit (consisting of a wireless communication module) and a power supply part.
Wireless sensor technology has been widely applied in various internet of things scenes including power systems. However, the existing wireless sensor is often designed with consideration of more functional performance requirements and neglects information security protection, and a corresponding security protection verification means is not set for the wireless sensor, so that an attacker may conveniently acquire confidential information of the wireless sensor and modify program codes in the sensing node, for example, the sensing node has a plurality of identity IDs, thereby communicating in the sensor network with a plurality of identities, and in addition, the attacker may also forge or pretend to be a legitimate node to join in the sensing network by acquiring information such as keys and codes stored in the wireless sensor. Once a part of nodes in the sensor network are controlled, an attacker can launch many kinds of attacks, such as monitoring information transmitted in the sensor network, issuing false routing information or transmitting false sensing information to the sensor network, performing denial of service attacks, and the like.
Disclosure of Invention
Therefore, the invention provides a trusted wireless sensor network architecture and a control method, which can ensure the integrity of software and hardware of a wireless sensor and solve the problem that the information of the wireless sensor network is monitored or false information is transmitted.
The embodiment of the invention provides a credible wireless sensor, which comprises: trusted computing module, processing control module, data acquisition module, wireless communication module, wherein: the trusted computing module acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module, computes metric values of the program data in the data acquisition module, the wireless communication module, the processing control module and the processing control module according to the hardware serial numbers and the program data, compares the metric values with a preset value, and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the processing control module transmits the sensing data through a sensor network formed by the wireless communication module among the plurality of trusted wireless sensors.
Further, the trusted computing module comprises: the cryptography service submodule is used for acquiring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module, acquiring program data in the processing control module, generating a hardware metric value according to the hardware serial numbers, and performing hash calculation on the program data to obtain a program metric value; and the integrity storage and measurement submodule is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating the control instruction according to a comparison result.
Further, the integrity storage and measurement submodule is specifically configured to: measuring first program data in the processing control module to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module to obtain a hardware metric value, and comparing the hardware metric value with a second preset value; and when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value, generating the control instruction.
Further, the process control module includes: the microprocessor judges whether the sensing data sent by the data acquisition module is received within preset time; if the microprocessor does not receive the sensing data sent by the data acquisition module within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module to perform trusted computing; the trusted computing module calculates a program metric value of a second program in the volatile memory and stores the program metric value of the second program;
and the microprocessor stores the second program into the nonvolatile memory and enables the data acquisition module to enter a sleep state according to the sleep instruction.
Further, the data acquisition module receives a wake-up instruction sent by the microprocessor; the trusted computing module extracts the second program from the nonvolatile memory to perform trusted computing, and judges whether a program metric value of the second program is consistent with a third preset value; if the program metric value of the second program is consistent with a third preset value, the trusted computing module feeds back a trusted computing success result to the microprocessor; and the microprocessor loads the second program to the volatile memory according to the trusted computing success result and wakes up the data acquisition module.
Further, if the program metric value of the second program is inconsistent with a third preset value, the trusted computing module feeds back a trusted computing failure result to the microprocessor; and the microprocessor resets the data acquisition module according to the trusted computing failure result.
Further, the trusted computing module further comprises: and the platform data protection sub-module is used for storing the hardware metric value and the program metric value.
Further, the trusted computing module further comprises: and the identity identification submodule is used for providing an identity identification key, the trusted computing module carries out identity verification on the data acquisition module according to the requirements of a communication protocol, and the processing control module receives and processes the data sent by the data acquisition module after the verification is passed.
Further, the trusted wireless sensor further comprises: and the energy supply module is used for providing power for the trusted computing module, the processing control module, the data acquisition module and the wireless communication module.
The embodiment of the invention also provides a control method of the credible wireless sensor, which comprises the following steps: acquiring a hardware serial number and program data of a target object to be verified, calculating a metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control instruction according to a comparison result; acquiring the control instruction, and generating a starting instruction according to the control instruction; and acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of trusted wireless sensors.
The technical scheme of the invention has the following advantages:
the embodiment of the invention provides a trusted wireless sensor and a control method, wherein a trusted computing module of the trusted wireless sensor acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module to compute a metric value, compares the metric value with a preset value and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the wireless communication module transmits sensing data in a sensor network formed among a plurality of credible wireless sensors. According to the trusted wireless sensor and the control method provided by the invention, trusted calculation is carried out before the wireless sensor is used for data transmission, and data transmission is carried out under the condition that the wireless sensor is determined to be trusted, so that the software and hardware integrity of the wireless sensor can be protected, the security of a wireless sensor body is enhanced, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a composition diagram of a specific example of a trusted wireless sensor provided in an embodiment of the present invention;
FIG. 2 is a block diagram of another specific example of a trusted wireless sensor provided in an embodiment of the present invention;
FIG. 3 is a sleep flow diagram for providing a trusted wireless sensor in an embodiment of the present invention;
FIG. 4 is a wake-up flow diagram for providing a trusted wireless sensor in an embodiment of the present invention;
fig. 5 is a flowchart of a specific example of a control method for providing a trusted wireless sensor in an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
An embodiment of the present invention provides a trusted wireless sensor, as shown in fig. 1, the trusted wireless sensor includes: the device comprises a trusted computing module 1, a processing control module 2, a data acquisition module 3 and a wireless communication module 4.
Optionally, in some embodiments of the present invention, a plurality of trusted wireless sensors may establish communication connection through the wireless communication module 4, thereby constructing a wireless transmission network. When a trusted wireless sensor in the wireless transmission network needs to work, firstly, the trusted computing module 1 acquires the hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and program data of the processing control module 2, computes the program metric values of the processing control module 2, the data acquisition module 3, the wireless communication module 4 and the processing control module 2 according to the hardware serial numbers and the program data, compares the metric values with preset values, and generates a control instruction according to the comparison result. In a preferred embodiment, as shown in fig. 2, the trusted computing module 1 comprises:
and the cryptography service sub-module 11 is configured to acquire respective hardware serial numbers of the processing control module 2, the data acquisition module 3, and the wireless communication module 4, acquire program data in the processing control module 2, generate a hardware metric value according to the hardware serial numbers, and perform hash calculation on the program data to obtain the program metric value. In a preferred embodiment, the cryptography service sub-module 11 can also provide encryption and public key cryptography for data to ensure the security and reliability of the data.
And the platform data protection sub-module 12 is used for storing the hardware metric value and the program metric value. In the embodiment of the present invention, the platform data protection sub-module 12 includes a Platform Configuration Register (PCR) for storing the metric value of the metric object.
And the integrity storage and measurement submodule 13 is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating a control instruction according to the comparison result. In the embodiment of the invention, the integrity storage and measurement sub-module 13 stores the integrity preset value of each measurement object, integrity measurement is carried out on the hardware of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and the program in the processing control module 2, the trusted computing module 1 judges the integrity of the software and the hardware of the trusted wireless sensor according to the comparison of the preset value and the measurement value, and can send instructions of starting, resetting, recovering and the like to the processing control module according to the judgment result, thereby carrying out safety protection.
In a preferred embodiment, the integrity storage and measurement submodule 13 is specifically configured to: measuring first program data in the processing control module 2 to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 to obtain a hardware metric value, and comparing the hardware metric value with a second preset value;
and generating a control instruction when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value. In the embodiment of the invention, when the measurement value of the program measurement value hardware is consistent with the corresponding preset value, the software and the hardware of the trusted sensor are complete and safe, and then a control instruction can be issued to the processing control module 2 to perform subsequent data processing work.
In the embodiment of the present invention, the starting process of the trusted wireless sensor includes: after the trusted wireless sensor is powered on or reset, the trusted computing module 1 performs integrity measurement on a starting program in the processing control module 2, when the starting program is consistent with a preset value, the processing control module 2 loads and runs the starting program, the measurement program in the starting program performs integrity measurement on a main program by using the trusted computing module 1, when the measurement value of the main program is consistent with the preset value, the processing control module 2 loads and runs the main program, and the starting process is ended. In the embodiment of the invention, the hardware serial numbers of all modules are recorded in the starting program, when the serial numbers of all modules are consistent with the preset value, the hardware is complete and reliable, the trusted wireless sensor can be safely started, and the main program uses the hardware with the corresponding serial numbers to perform data processing.
And the identity identification submodule 14 is used for providing an identity identification key and providing the identity identification key, the trusted computing module 1 performs identity authentication on the data acquisition module 3 according to the requirements of the communication protocol, and the processing control module 2 receives and processes the data sent by the data acquisition module 3 after the authentication is passed. In the embodiment of the present invention, the identity identification submodule 14 ensures the security of the acquired data by identifying the identity of the data acquisition module 3, the working principle thereof conforms to the relevant regulations of the national relevant trusted cryptographic module standard, and a person skilled in the art can verify the identity of the data acquisition module 3 according to the prior art.
The processing control module 2 receives the control instruction sent by the trusted computing module 1, and generates a starting instruction according to the control instruction so as to start the data acquisition module 3 and the wireless communication module 4. In the embodiment of the present invention, the processing control module 2 is a core module for executing business calculation and functions, and includes a microprocessor 21, a volatile memory 22, and a nonvolatile memory 23, and can receive a relevant instruction from the trusted computing module 1, and receive the data acquisition module 3 and the wireless communication module 4 for processing according to the needs of an actual application scenario.
The data acquisition module 3 acquires sensing data and sends the sensing data to the processing control module 2; in the embodiment of the present invention, the data acquisition module 3 includes a sensing submodule 31 and an a/D conversion submodule 32, and the sensing submodule 31 converts the acquired data into a digital signal through the a/D conversion submodule 32, and then sends the digital signal to the processing control module 2.
The processing control module 2 transmits sensing data through a sensor network formed among a plurality of credible wireless sensors through the wireless communication module 4. In the embodiment of the present invention, the wireless communication module includes a wireless transceiver 41 and a network protocol 42, and the wireless transceiver 41 transmits and receives data according to the network protocol 42 and the processing control module 2.
In practical applications, when the trusted wireless sensor is not required to acquire data within a preset time or the processing control module 2 does not receive the sensing data sent by the data acquisition module 3 within a preset time range, the trusted wireless sensor can be dormant, in an embodiment of the present invention, as shown in fig. 3, a dormancy process of the trusted wireless sensor includes:
step S11, the microprocessor 21 judges whether the sensing data sent by the data acquisition module 3 is received within the preset time;
and step S12, if the microprocessor 21 does not receive the sensing data sent by the data acquisition module 3 within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module 1 to perform trusted computing.
Step S13: the trusted computing module 1 computes a program metric value for the second program in the volatile memory 22 and stores the program metric value for the second program.
Step S14: the microprocessor 21 stores the second program in the nonvolatile memory 23, and causes the data collection module 3 to enter a sleep state according to the sleep instruction.
In practical application, the processing control module 2 wakes up the trusted wireless sensor entering the sleep state periodically according to application needs, or listens to the wireless communication module 4, and wakes up when a trigger event is found, in an embodiment of the present invention, as shown in fig. 4, a wake-up process of the trusted wireless sensor includes:
step S21, the data acquisition module 3 receives the awakening instruction sent by the microprocessor 21;
in step S22, the trusted computing module 1 extracts the second program from the nonvolatile memory 23 for trusted computing, and determines whether the program metric value of the second program is consistent with a third preset value.
In step S23, if the program metric of the second program is consistent with the third preset value, the trusted computing module 1 feeds back a successful result of trusted computing to the microprocessor 21.
And step S24, the microprocessor 21 loads the second program into the volatile memory 22 according to the trusted computing success result and wakes up the data acquisition module 3.
Step S25, if the program metric value of the second program is inconsistent with the third preset value, the trusted computing module 1 feeds back a trusted computing failure result to the microprocessor 21; the microprocessor 21 resets the data acquisition module 3 according to the trusted computing failure result.
In a preferred embodiment, the trusted wireless sensor further comprises: and the energy supply module 5 is used for supplying power to the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4. In the embodiment of the invention, a battery power supply mode is adopted, the standard voltage is 5V, and power supply support is provided for the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4.
According to the trusted wireless sensor provided by the embodiment of the invention, the measurement values of the software and the hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent processes of wireless sensing data acquisition, processing, transmission and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Example 2
An embodiment of the present invention provides a method for controlling a trusted wireless sensor, as shown in fig. 5, the method for controlling a trusted wireless sensor specifically includes the following steps:
and step S1, acquiring the hardware serial number and the program data of the target object to be verified, calculating the metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control command according to the comparison result. In the embodiment of the present invention, the target object to be verified is each module and program data of the trusted wireless sensor in embodiment 1, and a specific process may correspond to a function implemented by the trusted computing module in embodiment 1, which is not described herein again.
And step S2, acquiring a control instruction and generating a starting instruction according to the control instruction. In this embodiment of the present invention, a specific process of generating the start instruction according to the control instruction may correspond to a function implemented by the processing control module in embodiment 1, which is not described herein again.
And step S3, acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of credible wireless sensors. In the embodiment of the present invention, the specific process of acquiring the sensing data and transmitting the sensing data through the sensor network formed among the plurality of trusted wireless sensors may correspond to the functions implemented by the processing control module, the data acquisition module, and the wireless communication module in embodiment 1, and will not be described herein again.
According to the trusted wireless sensor control method provided by the embodiment of the invention, the measurement values of software and hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent steps of wireless sensor data acquisition, processing, sending and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.

Claims (7)

1. A trusted wireless sensor, comprising: trusted computing module, processing control module, data acquisition module, wireless communication module, wherein:
the trusted computing module acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module, computes hardware metric values of the data acquisition module, the wireless communication module and the processing control module according to the hardware serial numbers, computes program metric values of the program data in the processing control module according to the program data, compares the hardware metric values and the program metric values with preset values, and generates a control instruction according to a comparison result;
the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module;
the data acquisition module acquires sensing data and sends the sensing data to the processing control module;
the processing control module transmits the sensing data through a sensor network formed among the plurality of trusted wireless sensors through the wireless communication module;
the process control module includes: volatile memory, non-volatile memory and a microprocessor,
the microprocessor judges whether the sensing data sent by the data acquisition module is received within a preset time;
if the microprocessor does not receive the sensing data sent by the data acquisition module within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module to perform trusted computing;
the trusted computing module calculates a program metric value of a second program in the volatile memory and stores the program metric value of the second program;
the microprocessor stores the second program into the nonvolatile memory and enables the data acquisition module to enter a sleep state according to the sleep instruction;
the data acquisition module receives a wake-up instruction sent by the microprocessor;
the trusted computing module extracts the second program from the nonvolatile memory to perform trusted computing, and judges whether a program metric value of the second program is consistent with a third preset value;
if the program metric value of the second program is consistent with a third preset value, the trusted computing module feeds back a trusted computing success result to the microprocessor;
and the microprocessor loads the second program to the volatile memory according to the trusted computing success result and wakes up the data acquisition module.
2. The trusted wireless sensor of claim 1, wherein the trusted computing module comprises:
the cryptography service submodule is used for acquiring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module, acquiring program data in the processing control module, generating a hardware metric value according to the hardware serial numbers, and performing hash calculation on the program data to obtain a program metric value;
and the integrity storage and measurement submodule is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating the control instruction according to a comparison result.
3. The trusted wireless sensor of claim 2, wherein the integrity storage and measurement submodule is specifically configured to:
measuring first program data in the processing control module to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module to obtain a hardware metric value, and comparing the hardware metric value with a second preset value;
and when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value, generating the control instruction.
4. The trusted wireless sensor of claim 2, wherein the trusted computing module further comprises: and the platform data protection sub-module is used for storing the hardware metric value and the program metric value.
5. The trusted wireless sensor of claim 2, wherein the trusted computing module further comprises: and the identity identification submodule is used for providing an identity identification key, the trusted computing module carries out identity verification on the data acquisition module according to the requirements of a communication protocol, and the processing control module receives and processes the data sent by the data acquisition module after the verification is passed.
6. The trusted wireless sensor of claim 1, wherein if the program metric value of the second program is inconsistent with a third predetermined value, the trusted computing module feeds back a trusted computing failure result to the microprocessor; and the microprocessor resets the data acquisition module according to the trusted computing failure result.
7. The trusted wireless sensor of claim 1, further comprising: and the energy supply module is used for providing power for the trusted computing module, the processing control module, the data acquisition module and the wireless communication module.
CN201810398711.7A 2018-04-28 2018-04-28 Credible wireless sensor and control method Active CN108683492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810398711.7A CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810398711.7A CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Publications (2)

Publication Number Publication Date
CN108683492A CN108683492A (en) 2018-10-19
CN108683492B true CN108683492B (en) 2021-09-03

Family

ID=63802672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810398711.7A Active CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Country Status (1)

Country Link
CN (1) CN108683492B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232417A (en) * 2007-01-25 2008-07-30 上海研祥智能科技有限公司 Embedded type wireless sensing network intelligent platform
CN101945385A (en) * 2010-09-10 2011-01-12 华南农业大学 Credible wireless sensor network node and control method thereof
CN103136485A (en) * 2011-11-28 2013-06-05 联想(北京)有限公司 Method of realizing computer safety and computer
CN103716797A (en) * 2009-03-06 2014-04-09 交互数字专利控股公司 Platform validation and management of wireless devices
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN106575345A (en) * 2014-09-23 2017-04-19 英特尔公司 Technologies for verifying components
CN107680636A (en) * 2016-08-02 2018-02-09 四川智康科技有限责任公司 A kind of clinical information processing system and method based on metadata
CN107851150A (en) * 2015-07-20 2018-03-27 英特尔公司 The technology that secure hardware and software for credible I/O prove

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8832461B2 (en) * 2010-06-25 2014-09-09 Microsoft Corporation Trusted sensors
US10303900B2 (en) * 2015-07-20 2019-05-28 Intel Corporation Technologies for secure programming of a cryptographic engine for trusted I/O

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232417A (en) * 2007-01-25 2008-07-30 上海研祥智能科技有限公司 Embedded type wireless sensing network intelligent platform
CN103716797A (en) * 2009-03-06 2014-04-09 交互数字专利控股公司 Platform validation and management of wireless devices
CN101945385A (en) * 2010-09-10 2011-01-12 华南农业大学 Credible wireless sensor network node and control method thereof
CN103136485A (en) * 2011-11-28 2013-06-05 联想(北京)有限公司 Method of realizing computer safety and computer
CN106575345A (en) * 2014-09-23 2017-04-19 英特尔公司 Technologies for verifying components
CN107851150A (en) * 2015-07-20 2018-03-27 英特尔公司 The technology that secure hardware and software for credible I/O prove
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN107680636A (en) * 2016-08-02 2018-02-09 四川智康科技有限责任公司 A kind of clinical information processing system and method based on metadata

Also Published As

Publication number Publication date
CN108683492A (en) 2018-10-19

Similar Documents

Publication Publication Date Title
CN109903433B (en) Access control system and access control method based on face recognition
US8799652B2 (en) Method for activating a network node
US7302252B2 (en) Authentication systems, wireless communication terminals, and wireless base stations
US8909931B2 (en) Server authentication system, server authentication method, and program for server authentication
CN102576397B (en) The checking of token and data integrity protection
KR101048509B1 (en) Method and apparatus for detecting civil attack node using location information and hash chain in ubiquitous sensor network
CN104751032A (en) Authentication method and authentication device
CN107845171B (en) Method and system for unlocking Internet of things intelligent lock by using wearable device
US8307055B2 (en) Secure platform management device
CN104303583A (en) System and method for establishing a secure connection in communications systems
CN114302389B (en) Authentication and key agreement method, gateway, sensor and electronic equipment
Lee et al. Flexicast: Energy-efficient software integrity checks to build secure industrial wireless active sensor networks
CN111131144B (en) IoT (Internet of things) equipment management method, device, server and storage medium
KR20090059573A (en) Entity authentication method and key management method in usn, and recording medium storing program including the same
CN104994085B (en) Identity identifying method and system in a kind of wireless sensor network
CN108683492B (en) Credible wireless sensor and control method
CN103560998A (en) Method and system for wireless sensor network to resist DoS attacks
CN111818083A (en) Information security collection and interaction system based on cloud server
EP3213509B1 (en) Method for verifying positions of a plurality of monitoring devices
KR100932905B1 (en) Sensing data relay apparatus and method, Sensing data management apparatus and method, Sensor network system thereof
CN110910141A (en) Transaction processing method, system, device, equipment and computer readable storage medium
CN109963277A (en) Super low-power consumption Internet of Things application module
WO2018076299A1 (en) Data transmission method and device
US20090150670A1 (en) Communication node authentication system and method, and communication node authentication program
WO2022031699A1 (en) Encrypted response timing for presence detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant