CN113507510B - Internet of things data illegal tampering monitoring method and system - Google Patents

Internet of things data illegal tampering monitoring method and system Download PDF

Info

Publication number
CN113507510B
CN113507510B CN202110710989.5A CN202110710989A CN113507510B CN 113507510 B CN113507510 B CN 113507510B CN 202110710989 A CN202110710989 A CN 202110710989A CN 113507510 B CN113507510 B CN 113507510B
Authority
CN
China
Prior art keywords
data
internet
things
user
progress bar
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110710989.5A
Other languages
Chinese (zh)
Other versions
CN113507510A (en
Inventor
兰雨晴
余丹
王丹星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongbiao Huian Information Technology Co Ltd
Original Assignee
Zhongbiao Huian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongbiao Huian Information Technology Co Ltd filed Critical Zhongbiao Huian Information Technology Co Ltd
Priority to CN202110710989.5A priority Critical patent/CN113507510B/en
Publication of CN113507510A publication Critical patent/CN113507510A/en
Application granted granted Critical
Publication of CN113507510B publication Critical patent/CN113507510B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method and a system for monitoring illegal tampering of data of the Internet of things, which are used for comprehensively judging whether the data of the Internet of things is illegally tampered or not by converting the data of the Internet of things into binary form data and judging whether the binary form data is modified or not, whether the identity of a user is legal or not and whether the result of verification operation performed by the user is correct or not, and can also perform corresponding alarm operation under the condition that the data of the Internet of things is not tampered, so that the comprehensiveness and timeliness of monitoring illegal tampering of the data of the Internet of things can be improved, the position of the data which is illegally tampered can be accurately determined, and the data safety of the Internet of things is greatly improved.

Description

Internet of things data illegal tampering monitoring method and system
Technical Field
The invention relates to the technical field of data security management of the Internet of things, in particular to an illegal tampering monitoring method and system for data of the Internet of things.
Background
The internet of things is widely applied to distributed data processing occasions, so that a user can utilize the mobile terminal to be connected with the internet of things, and corresponding information data can be obtained and the information data can be modified. However, the internet of things is inevitably invaded by illegal users and data is tampered in the operation process, which seriously affects the data security of the internet of things. In the prior art, whether the data of the internet of things is illegally tampered can be determined by judging the legality of the identity of each user accessing the internet of things, but the legality of the identity of each user can be verified by using a large amount of manpower and time, and meanwhile, the specific position of the illegally tampered data cannot be accurately determined, so that the timeliness and reliability of monitoring illegal tampering of the data of the internet of things are seriously reduced, and the data security of the internet of things is greatly influenced.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides an illegal tampering monitoring method and system for data of the Internet of things, which are used for acquiring the data of the Internet of things contained in a terminal of the Internet of things, correspondingly converting the data of the Internet of things into binary form data, analyzing the binary form data, determining whether the data of the Internet of things is modified, determining whether a user modifying the data of the Internet of things belongs to a legal authorized user, indicating a mobile terminal connected with the terminal of the Internet of things to carry out verification operation, and judging whether the data of the Internet of things is illegally modified according to the result of the verification operation; then according to the judgment result, carrying out alarm operation; therefore, the method and the system for monitoring illegal tampering of the data of the internet of things comprehensively judge whether the data of the internet of things is illegally tampered or not by converting the data of the internet of things into the data of the binary form and judging whether the data of the binary form is modified or not, whether the identity of a user is legal or not and whether the result of the verification operation performed by the user is correct or not, and can perform corresponding alarm operation under the condition that the data of the internet of things is not tampered, so that the comprehensiveness and timeliness of monitoring illegal tampering of the data of the internet of things can be improved, the position of the data where the illegal tampering occurs can be accurately determined, and the data safety of the internet of things is greatly improved.
The invention provides an illegal tampering monitoring method of data of the Internet of things, which is characterized by comprising the following steps:
step S1, collecting the data of the Internet of things contained in the Internet of things terminal, correspondingly converting the data of the Internet of things into binary form data, and analyzing the binary form data to determine whether the data of the Internet of things is modified;
step S2, if the data of the Internet of things is determined not to be modified, determining that the data of the Internet of things is not illegally tampered; if the data of the Internet of things is determined to be modified, determining whether a user modifying the data of the Internet of things belongs to a legal authorized user;
step S3, if the user belongs to a legal authorized user, determining that the data of the Internet of things is not illegally tampered; if the user does not belong to the legal authorized user, indicating the user to carry out verification operation on a mobile terminal connected with the Internet of things terminal, and judging whether the Internet of things data is illegally modified according to the result of the verification operation; then according to the judgment result, alarming operation is carried out;
further, in the step S1, the collecting internet of things data included in the internet of things terminal, correspondingly converting the internet of things data into binary format data, and analyzing the binary format data, so as to determine whether the internet of things data is modified specifically includes:
step S101, randomly collecting uplink or downlink Internet of things data of an Internet of things terminal, and correspondingly converting the Internet of things data into binary form data;
step S102, equally dividing the data transmission duration corresponding to the data of the Internet of things into a plurality of data transmission time intervals, and then dividing the binary form data into a plurality of binary data elements corresponding to each data transmission time interval;
step S103, determining whether the data of the Internet of things is modified by using the following formula (1),
Figure GDA0003678614400000021
in the above formula (1), Q denotes a determination value for determining whether the internet of things data is modified, when Q is 1, the internet of things data is modified, when Q is 0, the internet of things data is not modified, T denotes a time length corresponding to a data transmission time interval, and Si(kT) represents the ith binary data element, S, corresponding to the kth data transmission time intervali[(k-1)T]The method comprises the steps that the ith binary data element corresponding to a (k-1) th data transmission time interval is represented, n represents the total number of the binary data elements, delta { } represents a unit impulse function, when the value in brackets is equal to 0, the function value of the unit impulse function is 1, and when the value in brackets is not equal to 0, the function value of the unit impulse function is 0;
further, in the step S2, if the internet of things data is determined to be modified, determining whether the user who modifies the internet of things data belongs to a legal authorized user specifically includes:
step S201, if the data of the Internet of things is confirmed to be modified, obtaining login information of a user who modifies the data of the Internet of things to log in the terminal of the Internet of things, wherein the login information comprises a user name and a login password; then the user name and the login password are respectively converted into a user name in a binary character string form and a login password in a binary character string form;
step S202, determining whether the user modifying the data of the Internet of things belongs to a legal authorized user or not by using the following formula (2) according to the login information,
Figure GDA0003678614400000031
in the above formula (2), η represents a determination value for determining whether a user modifying the data of the internet of things belongs to a legal authorized user, when η is 1, it represents that the user modifying the data of the internet of things belongs to a legal authorized user, and when η is 0, it represents that the user modifying the data of the internet of things does not belong to a legal authorized user, YdA d-th character, M, in the user name in the form of a binary string representing the user currently modifying the data of the Internet of thingsdA d-th character, Y, in a login password in the form of a binary string representing a user currently modifying the Internet of things dataa,dThe d-th character, M, in the user name in the form of a binary character string representing the a-th predetermined legally authorized usera,dThe method comprises the steps that the D-th character in a binary character string form login password of an a-th preset legal authorized user is represented, A represents the total number of preset legal authorized users, D represents a user name in a binary character string form or the character length of the binary character string form login password, delta { } represents a unit impulse function, when a numerical value in brackets is equal to 0, the function value of the unit impulse function is 1, and when the numerical value in brackets is not equal to 0, the function value of the unit impulse function is 0;
further, in the step S3, if the user does not belong to a legal authorized user, the user is instructed to perform a verification operation on the mobile terminal connected to the internet of things terminal, and according to a result of the verification operation, it is determined whether the internet of things data is modified illegally; and then according to the said judged result, carry on the alarm operation and specifically include:
step S301, if the user does not belong to a legal authorized user, indicating the user to upload a telephone number corresponding to the mobile terminal, if the telephone number belongs to a certain telephone number in a preset authorized white list, determining that the data of the Internet of things is not illegally tampered, and if the telephone number does not belong to the telephone number in the preset authorized white list, sending a verification operation instruction to the mobile terminal;
step S302, according to the verification operation instruction, the mobile terminal is instructed to display a sliding progress bar on a touch display screen of the mobile terminal, and the user is instructed to slide the sliding progress bar to a position of a preset percentage of the total length of the sliding progress bar; determining a ratio between a length of a rectangular area through which the sliding progress bar is slid after the user slides the sliding progress bar and a total length of the sliding progress bar using the following formula (3),
Figure GDA0003678614400000041
in the above formula (3), λ (t) represents a ratio between a length of a rectangular region through which the sliding progress bar slides and a total length of the sliding progress bar corresponding to t time in a sliding process of the sliding progress bar performed by the user, a lower left corner vertex of the touch display screen is used as an origin, a right side of the touch display screen in the width direction is an X axis, and an upper side of the touch display screen in the length direction is a Y axis to construct a corresponding coordinate system, (X) where1,y1) (x) coordinates in the coordinate system of the top left vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)2,y2) (x) coordinates in the coordinate system of the upper right vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)3,y3) (x) coordinates in the coordinate system of a lower left vertex of a rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)4,y4) Representing coordinates of a lower right vertex of a rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x (t), y (t)) representing coordinates of a position point, in the coordinate system, where the user's finger is in contact with the touch display screen at time t;
step S303, comparing the ratio with the preset percentage, if the ratio is equal to the preset percentage and the contact duration of the finger of the user and the current position point of the touch display screen is greater than or equal to a preset duration threshold, determining that the data of the Internet of things is not illegally tampered, otherwise, determining that the data of the Internet of things is illegally tampered;
step S304, after the data of the Internet of things are determined to be illegally tampered, the terminal of the Internet of things is switched to a dormant locking state, and meanwhile, a corresponding data tampering alarm signal is sent to the cloud center of the Internet of things.
The invention also provides an illegal tampering monitoring system of the data of the Internet of things, which is characterized by comprising an Internet of things data acquisition and conversion module, a first judgment module, a second judgment module, a third judgment module and an alarm module; wherein the content of the first and second substances,
the Internet of things data acquisition and conversion module is used for acquiring Internet of things data contained in an Internet of things terminal and correspondingly converting the Internet of things data into binary form data;
the first judging module is used for analyzing the binary form data so as to determine whether the data of the Internet of things is modified or not, and when the data of the Internet of things is determined not to be modified, the data of the Internet of things is determined not to be illegally tampered;
the second judging module is used for determining whether a user modifying the data of the internet of things belongs to a legal authorized user or not when the data of the internet of things is determined to be modified, and determining that the data of the internet of things is not illegally modified when the user belongs to the legal authorized user;
the third judging module is used for indicating the user to carry out verification operation on a mobile terminal connected with the Internet of things terminal when the user does not belong to a legal authorized user, and judging whether the Internet of things data is illegally modified according to the result of the verification operation;
the alarm module is used for carrying out alarm operation according to the judgment result of the third judgment module;
further, the internet of things data acquisition and conversion module is used for acquiring internet of things data contained in the internet of things terminal, and correspondingly converting the internet of things data into binary form data specifically includes:
randomly collecting uplink or downlink Internet of things data of an Internet of things terminal, and correspondingly converting the Internet of things data into binary form data;
and the number of the first and second groups,
the first determining module is configured to analyze the binary form data to determine whether the internet of things data is modified, and when the internet of things data is determined not to be modified, determining that the internet of things data is not illegally tampered specifically includes:
equally dividing the data transmission duration corresponding to the data of the Internet of things into a plurality of data transmission time intervals, and then dividing the binary form data into a plurality of binary data elements corresponding to each data transmission time interval;
determining whether the data of the Internet of things is modified by using the following formula (1),
Figure GDA0003678614400000061
in the above formula (1), Q represents a determination value for determining whether the internet of things data is modified, when Q is 1, the internet of things data is modified, when Q is 0, the internet of things data is not modified, T represents a time length corresponding to a data transmission time interval, and Si(kT) denotes the kthThe ith binary data element, S, corresponding to the data transmission time intervali[(k-1)T]Representing the ith binary data element corresponding to the (k-1) th data transmission time interval, wherein n represents the total number of the binary data elements, and delta { } represents a unit impulse function, wherein when the numerical value in the bracket is equal to 0, the function value of the unit impulse function is 1, and when the numerical value in the bracket is not equal to 0, the function value of the unit impulse function is 0;
further, the second determining module is configured to determine whether the user who modifies the data of the internet of things belongs to a legal authorized user when the data of the internet of things is determined to be modified, and determine that the data of the internet of things is not illegally tampered when the user belongs to the legal authorized user specifically includes:
if the data of the Internet of things is determined to be modified, obtaining login information of a user who modifies the data of the Internet of things logging in the terminal of the Internet of things, wherein the login information comprises a user name and a login password; then the user name and the login password are respectively converted into a user name in a binary character string form and a login password in a binary character string form;
then, the following formula (2) is utilized, and whether the user modifying the data of the Internet of things belongs to a legal authorized user is determined according to the login information,
Figure GDA0003678614400000071
in the above formula (2), η represents a determination value for determining whether or not a user who modifies the data of the internet of things belongs to a legitimate authorized user, and when η is 1, it represents that the user who modifies the data of the internet of things belongs to a legitimate authorized user, and when η is 0, it represents that the user who modifies the data of the internet of things does not belong to a legitimate authorized user, and YdA d-th character, M, in the user name in the form of a binary string representing the user currently modifying the data of the Internet of thingsdA d-th character, Y, in a login password in the form of a binary string representing a user currently modifying the Internet of things dataa,dBinary string representation of a-th predetermined legally authorized userThe d character in the user name of formula (I), Ma,dThe method comprises the steps that the D-th character in a binary character string form login password of an a-th preset legal authorized user is represented, A represents the total number of preset legal authorized users, D represents a user name in a binary character string form or the character length of the binary character string form login password, delta { } represents a unit impulse function, when a numerical value in brackets is equal to 0, the function value of the unit impulse function is 1, and when the numerical value in brackets is not equal to 0, the function value of the unit impulse function is 0;
further, the third determining module is configured to, when the user does not belong to a legal authorized user, instruct the user to perform a verification operation on a mobile terminal connected to the internet of things terminal, and determine whether the internet of things data is illegally modified according to a result of the verification operation, specifically including:
if the user does not belong to a legal authorized user, instructing the user to upload a telephone number corresponding to the mobile terminal, if the telephone number belongs to a certain telephone number in a preset authorized white list, determining that the data of the Internet of things is not illegally tampered, and if the telephone number does not belong to the telephone number in the preset authorized white list, sending a verification operation instruction to the mobile terminal;
then, according to the verification operation instruction, the mobile terminal is instructed to display a sliding progress bar on a touch display screen of the mobile terminal, and the user is instructed to slide the sliding progress bar to a position of a preset percentage of the total length of the sliding progress bar; determining a ratio between a length of a rectangular area through which the sliding progress bar is slid after the user slides the sliding progress bar and a total length of the sliding progress bar using the following formula (3),
Figure GDA0003678614400000081
in the above formula (3), λ (t) represents a rectangular area through which the sliding progress bar is slid at time t during the sliding of the sliding progress bar by the userThe ratio of the length of the touch display screen to the total length of the sliding progress bar is determined by taking the vertex of the lower left corner of the touch display screen as an origin, taking the right side of the touch display screen in the width direction as an X axis, and taking the upper side of the touch display screen in the length direction as a Y axis to construct a corresponding coordinate system, (X is a Y axis)1,y1) (x) coordinates in the coordinate system of the top left vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)2,y2) (x) coordinates in the coordinate system of the upper right vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)3,y3) Coordinates in the coordinate system of a lower left vertex of a rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)4,y4) Representing coordinates of a lower right vertex of a rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x (t), y (t)) representing coordinates of a position point, in the coordinate system, where the user's finger is in contact with the touch display screen at time t;
finally, comparing the ratio with the preset percentage, if the ratio is equal to the preset percentage and the contact duration of the finger of the user and the current position point of the touch display screen is greater than or equal to a preset duration threshold, determining that the data of the Internet of things is not illegally tampered, and otherwise, determining that the data of the Internet of things is illegally tampered;
and (c) a second step of,
the alarm module is used for carrying out alarm operation according to the judgment result of the third judgment module, and specifically comprises the following steps:
and when the data of the Internet of things is determined to be illegally tampered, switching the terminal of the Internet of things to a dormant locking state, and meanwhile sending a corresponding data tampering alarm signal to the cloud center of the Internet of things.
Compared with the prior art, the method and the system for monitoring the illegal tampering of the data of the internet of things acquire the data of the internet of things contained in the terminal of the internet of things, correspondingly convert the data of the internet of things into the data in the binary form, analyze the data in the binary form, determine whether the data of the internet of things is modified, determine whether a user modifying the data of the internet of things belongs to a legal authorized user, instruct the user to carry out verification operation on a mobile terminal connected with the terminal of the internet of things, and judge whether the data of the internet of things is illegally modified according to the result of the verification operation; then according to the judgment result, carrying out alarm operation; therefore, the method and the system for monitoring illegal tampering of the data of the internet of things comprehensively judge whether the data of the internet of things is illegally tampered or not by converting the data of the internet of things into the data of the binary form and judging whether the data of the binary form is modified or not, whether the identity of a user is legal or not and whether the result of the verification operation performed by the user is correct or not, and can perform corresponding alarm operation under the condition that the data of the internet of things is not tampered, so that the comprehensiveness and timeliness of monitoring illegal tampering of the data of the internet of things can be improved, the position of the data where the illegal tampering occurs can be accurately determined, and the data safety of the internet of things is greatly improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow diagram of an illegal tampering monitoring method for internet of things data provided by the present invention.
Fig. 2 is a schematic structural diagram of the system for monitoring illegal tampering of data of the internet of things provided by the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of a method for monitoring illegal tampering of data of the internet of things according to an embodiment of the present invention. The illegal tampering monitoring method for the data of the Internet of things comprises the following steps:
step S1, collecting the data of the Internet of things contained in the Internet of things terminal, correspondingly converting the data of the Internet of things into binary form data, and analyzing the binary form data to determine whether the data of the Internet of things is modified;
step S2, if the data of the Internet of things is determined not to be modified, determining that the data of the Internet of things is not illegally tampered; if the data of the Internet of things is determined to be modified, determining whether a user modifying the data of the Internet of things belongs to a legal authorized user;
step S3, if the user belongs to a legal authorized user, determining that the data of the Internet of things is not illegally tampered; if the user does not belong to the legal authorized user, indicating the user to carry out verification operation on the mobile terminal connected with the Internet of things terminal, and judging whether the data of the Internet of things is illegally modified according to the result of the verification operation; and then according to the judgment result, performing alarm operation.
The beneficial effects of the above technical scheme are: the method for monitoring illegal tampering of the data of the Internet of things converts the data of the Internet of things into the data in the binary form, comprehensively judges whether the data of the Internet of things is illegally tampered or not from three aspects of judging whether the data in the binary form is modified or not, whether the identity of a user is legal or not and whether the result of verification operation performed by the user is correct or not, and can perform corresponding alarm operation under the condition that the data of the Internet of things is not tampered, so that the comprehensiveness and timeliness of monitoring illegal tampering of the data of the Internet of things can be improved, the position of the data which is illegally tampered can be accurately determined, and the data safety of the Internet of things is greatly improved.
Preferably, in step S1, the collecting internet of things data included in the internet of things terminal, correspondingly converting the internet of things data into binary form data, and analyzing the binary form data, so as to determine whether the internet of things data is modified specifically includes:
step S101, randomly acquiring Internet of things data of uplink or downlink of an Internet of things terminal, and correspondingly converting the Internet of things data into binary form data;
step S102, equally dividing the data transmission duration corresponding to the data of the Internet of things into a plurality of data transmission time intervals, and then dividing the binary form data into a plurality of binary data elements corresponding to each data transmission time interval;
step S103, using the following formula (1), determining whether the data of the Internet of things is modified,
Figure GDA0003678614400000111
in the above formula (1), Q denotes a determination value for determining whether the internet of things data is modified, when Q is 1, the internet of things data is modified, when Q is 0, the internet of things data is not modified, T denotes a time length corresponding to a data transmission time interval, and Si(kT) denotes the ith binary data element, S, corresponding to the kth data transmission time intervali[(k-1)T]Represents the ith binary data element corresponding to the k-1 th data transmission time interval, n represents the total number of the binary data elements, and delta { } represents unit impulseAnd a function having a function value of 1 when the value in the parentheses is equal to 0 and a function value of 0 when the value in the parentheses is not equal to 0.
The beneficial effects of the above technical scheme are: by randomly collecting uplink or downlink Internet of things data of the Internet of things data and converting the uplink or downlink Internet of things data into binary form data, all-weather monitoring on the real-time condition of the Internet of things data can be facilitated, and the difficulty of subsequently comparing and analyzing the data is reduced. In addition, as the data acquisition of the Internet of things is a continuous process, the data acquisition is actually carried out in the duration time dependent on the data transmission of the Internet of things, and the data content collected at different times in the whole process of the data transmission duration is different, by equally dividing the data transmission duration into a plurality of data transmission time intervals, different data of the internet of things can be acquired in each data transmission time interval respectively, the data of the internet of things can be converted into binary form data, and finally, each binary form data is divided into a plurality of binary data elements according to the minimum length of the binary character string so as to compare the binary data elements in the following, the minimum length of the binary string may be predetermined, for example, the minimum length may be, but is not limited to, 5 bits or 10 bits. Finally, by using the formula (1), the change of the data of the internet of things can be accurately and finely judged on the level of the data bit characters, so that the reliability and the confidence coefficient for determining whether the data of the internet of things is modified are improved.
Preferably, in the step S2, if the internet of things data is determined to be modified, the determining whether the user who modifies the internet of things data belongs to a legal authorized user specifically includes:
step S201, if the data of the Internet of things is determined to be modified, obtaining login information of a user for modifying the data of the Internet of things to log in the terminal of the Internet of things, wherein the login information comprises a user name and a login password; then the user name and the login password are respectively converted into a user name in a binary string form and a login password in a binary string form;
step S202, using the following formula (2) and according to the login information, determining whether the user modifying the data of the Internet of things belongs to a legal authorized user,
Figure GDA0003678614400000121
in the above formula (2), η represents a determination value for determining whether or not a user who modifies the data of the internet of things belongs to a legitimate authorized user, and when η is 1, it represents that the user who modifies the data of the internet of things belongs to a legitimate authorized user, and when η is 0, it represents that the user who modifies the data of the internet of things does not belong to a legitimate authorized user, and YdA d character, M, in the user name in the form of a binary string representing the user currently modifying the data of the Internet of thingsdA d character, Y, in the login password in the form of a binary string representing the user currently modifying the data of the Internet of thingsa,dM-th character in the user name in the form of a binary character string representing the a-th predetermined legally authorized usera,dThe method comprises the steps that the D-th character in a binary string type login password of an a-th preset legal authorized user is represented, A represents the total number of preset legal authorized users, D represents a user name in a binary string type or the character length of the binary string type login password, delta { } represents a unit impulse function, when a numerical value in brackets is equal to 0, the function value of the unit impulse function is 1, and when the numerical value in brackets is not equal to 0, the function value of the unit impulse function is 0.
The beneficial effects of the above technical scheme are: when the user modifies the data of the internet of things, the user needs to input a corresponding user name and a corresponding login password as login information so as to obtain the permission of entering the terminal of the internet of things. Through the formula (2), the login information of the current user can be comprehensively compared with the login information of the preset legal authorized user, so that the effectiveness and the accuracy of determining whether the user modifying the data of the Internet of things belongs to the legal authorized user are improved.
Preferably, in the step S3, if the user does not belong to a legal authorized user, the user is instructed to perform a verification operation on the mobile terminal connected to the internet of things terminal, and whether the internet of things data is illegally modified is determined according to a result of the verification operation; then according to the judgment result, the alarming operation specifically comprises the following steps:
step S301, if the user does not belong to a legal authorized user, indicating the user to upload a telephone number corresponding to the mobile terminal, if the telephone number belongs to a certain telephone number in a preset authorized white list, determining that the data of the Internet of things is not illegally tampered, and if the telephone number does not belong to the telephone number in the preset authorized white list, sending a verification operation instruction to the mobile terminal;
step S302, according to the verification operation instruction, instructing the mobile terminal to display a sliding progress bar on a touch display screen of the mobile terminal, and instructing the user to slide the sliding progress bar to a position of a preset percentage of the total length of the sliding progress bar; determining a ratio between a length of the rectangular area through which the sliding progress bar is slid after the user slides the sliding progress bar and a total length of the sliding progress bar using the following formula (3),
Figure GDA0003678614400000131
in the above formula (3), λ (t) represents a ratio between a length of a rectangular region through which the sliding progress bar is slid corresponding to t time in a process that the user slides the sliding progress bar and a total length of the sliding progress bar, a lower left corner vertex of the touch display screen is used as an origin, a right side of the touch display screen in the width direction is an X axis, and an upper side of the touch display screen in the length direction is a Y axis to construct a corresponding coordinate system, (X) represents a ratio between a length of the rectangular region through which the sliding progress bar is slid and a total length of the sliding progress bar, where X represents a ratio between a lower left corner vertex of the touch display screen as an origin and an upper side of the touch display screen in the length direction as a Y axis1,y1) (x) coordinates in the coordinate system of the top left vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)2,y2) Indicating a right side of a rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress barThe coordinates of the upper vertex in the coordinate system, (x)3,y3) (x) coordinates of a lower left vertex of the rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar4,y4) The coordinates of the top point at the lower right of the rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to the position of the preset percentage of the total length of the sliding progress bar are expressed, and (x (t), y (t)) the coordinates of the position point, in the coordinate system, of the contact between the finger of the user and the touch display screen at the moment t;
step S303, comparing the ratio with the preset percentage, if the ratio is equal to the preset percentage and the contact duration of the finger of the user and the current position point of the touch display screen is greater than or equal to a preset duration threshold, determining that the data of the Internet of things is not illegally tampered, otherwise, determining that the data of the Internet of things is illegally tampered;
and step S304, after the data of the Internet of things is determined to be illegally tampered, the terminal of the Internet of things is switched to a dormant locking state, and meanwhile, a corresponding data tampering alarm signal is sent to the cloud center of the Internet of things.
The beneficial effects of the above technical scheme are: the user can acquire and modify the data of the internet of things only by connecting the mobile terminal with the terminal of the internet of things, namely the mobile terminal is used as an intermediary for accessing the user to the terminal of the internet of things, the phone number of the mobile terminal is acquired, and a corresponding verification operation instruction is sent to the mobile terminal according to the phone number, so that the user is instructed to perform corresponding verification operation on the mobile terminal by means of the sliding progress bar, the amplitude of the sliding progress bar of the user is determined in real time by using the formula (3) in the process of sliding the progress bar, the legality of the user identity is determined by using a dynamic action verification mode, and a reliable basis is provided without determining whether the data of the internet of things is illegally tampered. And finally, after the data of the Internet of things is determined to be illegally tampered, the terminal of the Internet of things is switched to a dormant locking state, and meanwhile, a corresponding data tampering alarm signal is sent to the cloud center of the Internet of things, so that the terminal of the Internet of things can be timely prevented from being further illegally invaded, and the data security of the terminal of the Internet of things is greatly improved.
Fig. 2 is a schematic structural diagram of an illegal tampering monitoring system for data of the internet of things according to an embodiment of the present invention. The system for monitoring illegal tampering of the data of the Internet of things comprises a data acquisition and conversion module of the Internet of things, a first judgment module, a second judgment module, a third judgment module and an alarm module; wherein, the first and the second end of the pipe are connected with each other,
the Internet of things data acquisition and conversion module is used for acquiring Internet of things data contained in an Internet of things terminal and correspondingly converting the Internet of things data into binary form data;
the first judging module is used for analyzing the binary form data so as to determine whether the data of the Internet of things is modified or not, and when the data of the Internet of things is determined not to be modified, the data of the Internet of things is determined not to be illegally tampered;
the second judging module is used for determining whether a user modifying the data of the Internet of things belongs to a legal authorized user or not when the data of the Internet of things is determined to be modified, and determining that the data of the Internet of things is not illegally tampered when the user belongs to the legal authorized user;
the third judging module is used for indicating the user to carry out verification operation on the mobile terminal connected with the Internet of things terminal when the user does not belong to a legal authorized user, and judging whether the Internet of things data is illegally modified according to the result of the verification operation;
the alarm module is used for carrying out alarm operation according to the judgment result of the third judgment module.
The beneficial effects of the above technical scheme are: the illegal tampering monitoring system for the data of the Internet of things comprehensively judges whether the data of the Internet of things is illegally tampered or not by converting the data of the Internet of things into binary form data and judging whether the binary form data is modified or not, whether the identity of a user is legal or not and whether the result of verification operation performed by the user is correct or not, and can perform corresponding alarm operation under the condition that the data of the Internet of things is not tampered, so that the comprehensiveness and timeliness of illegal tampering monitoring of the data of the Internet of things can be improved, the position of the data which is illegally tampered can be accurately determined, and the data safety of the Internet of things is greatly improved.
Preferably, the internet of things data acquisition and conversion module is used for acquiring internet of things data contained in the internet of things terminal, and correspondingly converting the internet of things data into binary form data specifically includes:
randomly acquiring uplink or downlink Internet of things data of an Internet of things terminal, and correspondingly converting the Internet of things data into binary form data;
and the number of the first and second groups,
the first determining module is configured to analyze the binary form data to determine whether the data of the internet of things is modified, and when the data of the internet of things is determined not to be modified, determining that the data of the internet of things is not illegally tampered specifically includes:
equally dividing the data transmission duration corresponding to the data of the Internet of things into a plurality of data transmission time intervals, and then dividing the binary form data into a plurality of binary data elements corresponding to each data transmission time interval;
and then the following formula (1) is utilized to determine whether the data of the internet of things is modified,
Figure GDA0003678614400000151
in the above formula (1), Q denotes a determination value for determining whether the internet of things data is modified, when Q is 1, the internet of things data is modified, when Q is 0, the internet of things data is not modified, T denotes a time length corresponding to a data transmission time interval, and Si(kT) denotes the ith binary data element, S, corresponding to the kth data transmission time intervali[(k-1)T]And indicating the ith binary data element corresponding to the (k-1) th data transmission time interval, n indicating the total number of the binary data elements, and delta { } indicating a unit impulse function, wherein the function value of the unit impulse function is 1 when the value in the parentheses is equal to 0, and the function value of the unit impulse function is 0 when the value in the parentheses is not equal to 0.
The beneficial effects of the above technical scheme are: uplink or downlink internet of things data of the internet of things data are randomly collected and converted into binary data, all-weather monitoring can be conveniently carried out on the real-time situation of the internet of things data, and the difficulty of follow-up comparison and analysis on the data is reduced. In addition, since the data acquisition of the Internet of things is a continuous process, the data acquisition is actually carried out in the duration depending on the data transmission of the Internet of things, and the data content collected at different times in the whole process of the data transmission is different, by equally dividing the data transmission duration into a plurality of data transmission time intervals, different data of the internet of things can be acquired in each data transmission time interval respectively, the data of the internet of things can be converted into binary form data, and finally, each binary form data is divided into a plurality of binary data elements according to the minimum length of the binary character string so as to compare the binary data elements in the following process, the minimum length of the binary string may be predetermined, for example, the minimum length may be, but is not limited to, 5 bits or 10 bits. Finally, by using the formula (1), the change of the data of the internet of things can be accurately and finely judged on the level of the data bit characters, so that the reliability and the confidence degree for determining whether the data of the internet of things is modified are improved.
Preferably, the second determining module is configured to determine whether the user who modifies the data of the internet of things belongs to a legal authorized user when the data of the internet of things is determined to be modified, and determine that the data of the internet of things is not illegally tampered when the user belongs to the legal authorized user specifically includes:
if the data of the Internet of things is determined to be modified, obtaining login information of a user who modifies the data of the Internet of things for logging in the terminal of the Internet of things, wherein the login information comprises a user name and a login password; then the user name and the login password are respectively converted into a user name in a binary string form and a login password in a binary string form;
then, the following formula (2) is utilized, and whether the user modifying the data of the Internet of things belongs to a legal authorized user is determined according to the login information,
Figure GDA0003678614400000171
in the above formula (2), η represents a determination value for determining whether a user modifying the data of the internet of things belongs to a legitimate authorized user, when η is 1, it represents that the user modifying the data of the internet of things belongs to a legitimate authorized user, and when η is 0, it represents that the user modifying the data of the internet of things does not belong to a legitimate authorized user, and YdA d character, M, in the user name in the form of a binary string representing the user currently modifying the data of the Internet of thingsdA d character, Y, in the login password in the form of a binary string representing the user currently modifying the data of the Internet of thingsa,dM-th character in the user name in the form of a binary character string representing the a-th predetermined legally authorized usera,dThe method comprises the steps that the number D of characters in a binary character string form of an a-th preset legal authorized user is represented, A represents the total number of preset legal authorized users, D represents a user name in the binary character string form or the character length of the binary character string form of a login password, delta { } represents a unit impulse function, when a numerical value in brackets is equal to 0, the function value of the unit impulse function is 1, and when the numerical value in brackets is not equal to 0, the function value of the unit impulse function is 0.
The beneficial effects of the above technical scheme are: when the user modifies the data of the internet of things, the user needs to input a corresponding user name and a corresponding login password as login information so as to obtain the permission of entering the terminal of the internet of things. Through the formula (2), the login information of the current user can be comprehensively compared with the login information of the preset legal authorized user, so that the effectiveness and the accuracy of determining whether the user modifying the data of the Internet of things belongs to the legal authorized user are improved.
Preferably, the third determining module is configured to instruct the user to perform a verification operation on the mobile terminal connected to the internet of things terminal when the user does not belong to a legal authorized user, and determine whether the data of the internet of things is illegally modified according to a result of the verification operation specifically includes:
if the user does not belong to a legal authorized user, indicating the user to upload a telephone number corresponding to the mobile terminal, if the telephone number belongs to one telephone number in a preset authorized white list, determining that the data of the Internet of things is not illegally tampered, and if the telephone number does not belong to the telephone number in the preset authorized white list, sending a verification operation instruction to the mobile terminal;
then, according to the verification operation instruction, the mobile terminal is instructed to display a sliding progress bar on a touch display screen of the mobile terminal, and the user is instructed to slide the sliding progress bar to a position of a preset percentage of the total length of the sliding progress bar; determining a ratio between a length of the rectangular area through which the sliding progress bar is slid after the user slides the sliding progress bar and a total length of the sliding progress bar using the following formula (3),
Figure GDA0003678614400000181
in the above formula (3), λ (t) represents a ratio between a length of a rectangular region through which the sliding progress bar slides corresponding to time t during the sliding process of the sliding progress bar by the user and a total length of the sliding progress bar, a lower left corner vertex of the touch display screen is used as an origin, a right side of the touch display screen in the width direction is an X axis, and an upper side of the touch display screen in the length direction is a Y axis to construct a corresponding coordinate system, (X) is a coordinate system1,y1) (x) coordinates of the top left vertex of the rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar2,y2) (x) coordinates of the upper right vertex of the rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar3,y3) A bit representing that the sliding progress bar is slid to a preset percentage of the total length of the sliding progress barCoordinates of a lower left vertex of the rectangular area through which the sliding progress bar is slid in the coordinate system after the positioning, (x)4,y4) The coordinates of the top point at the lower right of the rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to the position of the preset percentage of the total length of the sliding progress bar are expressed, and (x (t), y (t)) the coordinates of the position point, in the coordinate system, of the contact between the finger of the user and the touch display screen at the moment t;
finally, comparing the ratio with the preset percentage, if the ratio is equal to the preset percentage and the contact duration of the finger of the user and the current position point of the touch display screen is greater than or equal to a preset duration threshold, determining that the data of the Internet of things is not illegally tampered, otherwise, determining that the data of the Internet of things is illegally tampered;
and the number of the first and second groups,
the alarm module is used for carrying out alarm operation according to the judgment result of the third judgment module, and specifically comprises the following steps:
and when the data of the Internet of things is determined to be illegally tampered, switching the terminal of the Internet of things to a dormant locking state, and meanwhile sending a corresponding data tampering alarm signal to the cloud center of the Internet of things.
The beneficial effects of the above technical scheme are: the user can acquire and modify the data of the internet of things only by connecting the mobile terminal with the terminal of the internet of things, namely the mobile terminal is used as an intermediary for accessing the user to the terminal of the internet of things, the phone number of the mobile terminal is acquired, and a corresponding verification operation instruction is sent to the mobile terminal according to the phone number, so that the user is instructed to perform corresponding verification operation on the mobile terminal by means of the sliding progress bar, the amplitude of the sliding progress bar of the user is determined in real time by using the formula (3) in the process of sliding the progress bar, the legality of the user identity is determined by using a dynamic action verification mode, and a reliable basis is provided without determining whether the data of the internet of things is illegally tampered. And finally, after the data of the Internet of things is determined to be illegally tampered, the terminal of the Internet of things is switched to a dormant locking state, and meanwhile, a corresponding data tampering alarm signal is sent to the cloud center of the Internet of things, so that the terminal of the Internet of things can be prevented from being further illegally invaded in time, and the data security of the terminal of the Internet of things is greatly improved.
As can be seen from the content of the above embodiment, the method and system for monitoring illegal tampering of internet of things data acquire internet of things data contained in an internet of things terminal, correspondingly convert the internet of things data into binary form data, and analyze the binary form data, thereby determining whether the internet of things data is modified, determining whether a user modifying the internet of things data belongs to a legal authorized user, instructing the user to perform a verification operation on a mobile terminal connected to the internet of things terminal, and determining whether the internet of things data is illegally modified according to a result of the verification operation; then according to the judgment result, carrying out alarm operation; therefore, the method and the system for monitoring illegal tampering of the data of the internet of things comprehensively judge whether the data of the internet of things is illegally tampered or not by converting the data of the internet of things into the data of the binary form and judging whether the data of the binary form is modified or not, whether the identity of a user is legal or not and whether the result of the verification operation performed by the user is correct or not, and can perform corresponding alarm operation under the condition that the data of the internet of things is not tampered, so that the comprehensiveness and timeliness of monitoring illegal tampering of the data of the internet of things can be improved, the position of the data where the illegal tampering occurs can be accurately determined, and the data safety of the internet of things is greatly improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (6)

1. The method for monitoring illegal tampering of data of the Internet of things is characterized by comprising the following steps:
step S1, collecting Internet of things data contained in an Internet of things terminal, correspondingly converting the Internet of things data into binary form data, and analyzing the binary form data to determine whether the Internet of things data is modified;
step S2, if the data of the Internet of things is determined not to be modified, determining that the data of the Internet of things is not illegally tampered; if the data of the Internet of things is determined to be modified, determining whether a user modifying the data of the Internet of things belongs to a legal authorized user;
step S3, if the user belongs to a legal authorized user, determining that the data of the Internet of things is not illegally tampered; if the user does not belong to the legal authorized user, indicating the user to carry out verification operation on a mobile terminal connected with the Internet of things terminal, and judging whether the Internet of things data is illegally modified according to the result of the verification operation; then according to the judgment result, alarming operation is carried out; in step S1, the acquiring internet of things data included in the internet of things terminal, correspondingly converting the internet of things data into binary format data, and analyzing the binary format data to determine whether the internet of things data is modified specifically includes:
step S101, randomly collecting uplink or downlink Internet of things data of an Internet of things terminal, and correspondingly converting the Internet of things data into binary form data;
step S102, equally dividing the data transmission duration corresponding to the data of the Internet of things into a plurality of data transmission time intervals, and then dividing the binary form data into a plurality of binary data elements corresponding to each data transmission time interval;
step S103, determining whether the data of the Internet of things is modified by using the following formula (1),
Figure FDA0003678614390000011
in the above formula (1), Q denotes a determination value for determining whether the internet of things data is modified, when Q is 1, the internet of things data is modified, when Q is 0, the internet of things data is not modified, T denotes a time length corresponding to a data transmission time interval, and Si(kT) denotes a kth data transmission time zoneI-th binary data element, S, corresponding theretoi[(k-1)T]And indicating the ith binary data element corresponding to the (k-1) th data transmission time interval, n indicating the total number of the binary data elements, and delta { } indicating a unit impulse function, wherein the function value of the unit impulse function is 1 when the value in the parentheses is equal to 0, and the function value of the unit impulse function is 0 when the value in the parentheses is not equal to 0.
2. The method for monitoring illegal tampering of data of the internet of things according to claim 1, characterized by:
in step S2, if the internet of things data is determined to be modified, determining whether the user who modifies the internet of things data belongs to a legal authorized user specifically includes:
step S201, if the data of the Internet of things is determined to be modified, obtaining login information of a user who modifies the data of the Internet of things to log in the terminal of the Internet of things, wherein the login information comprises a user name and a login password; then the user name and the login password are respectively converted into a user name in a binary string form and a login password in a binary string form;
step S202, determining whether the user modifying the data of the Internet of things belongs to a legal authorized user or not by using the following formula (2) according to the login information,
Figure FDA0003678614390000021
in the above formula (2), η represents a determination value for determining whether a user modifying the data of the internet of things belongs to a legal authorized user, when η is 1, it represents that the user modifying the data of the internet of things belongs to a legal authorized user, and when η is 0, it represents that the user modifying the data of the internet of things does not belong to a legal authorized user, YdA d-th character, M, in the user name in the form of a binary string representing the user currently modifying the data of the Internet of thingsdA d-th character, Y, in the login password in the form of a binary string representing a user currently modifying the data of the Internet of thingsa,dM-th character in the user name in the form of a binary character string representing the a-th predetermined legally authorized usera,dThe method comprises the steps that the D-th character in a binary string type login password of an a-th preset legal authorized user is represented, A represents the total number of preset legal authorized users, D represents a user name in a binary string type or the character length of the binary string type login password, delta { } represents a unit impulse function, when a numerical value in brackets is equal to 0, the function value of the unit impulse function is 1, and when the numerical value in brackets is not equal to 0, the function value of the unit impulse function is 0.
3. The method for monitoring illegal tampering of data of the internet of things according to claim 2, characterized in that:
in the step S3, if the user does not belong to a legal authorized user, the user is instructed to perform a verification operation on the mobile terminal connected to the internet of things terminal, and whether the internet of things data is illegally modified is determined according to a result of the verification operation; and then according to the said judged result, carry on the alarm operation and specifically include:
step S301, if the user does not belong to a legal authorized user, the user is instructed to upload a telephone number corresponding to the mobile terminal, if the telephone number belongs to a certain telephone number in a preset authorized white list, it is determined that the data of the Internet of things is not illegally tampered, and if the telephone number does not belong to the telephone number in the preset authorized white list, a verification operation instruction is sent to the mobile terminal;
step S302, according to the verification operation instruction, the mobile terminal is instructed to display a sliding progress bar on a touch display screen of the mobile terminal, and the user is instructed to slide the sliding progress bar to a position of a preset percentage of the total length of the sliding progress bar; determining a ratio between a length of a rectangular area through which the sliding progress bar is slid after the user slides the sliding progress bar and a total length of the sliding progress bar using the following formula (3),
Figure FDA0003678614390000031
in the above formula (3), λ (t) represents a ratio between a length of a rectangular region through which the sliding progress bar slides and a total length of the sliding progress bar corresponding to t time in a sliding process of the sliding progress bar performed by the user, a lower left corner vertex of the touch display screen is used as an origin, a right side of the touch display screen in the width direction is an X axis, and an upper side of the touch display screen in the length direction is a Y axis to construct a corresponding coordinate system, (X) where1,y1) (x) coordinates in the coordinate system of the top left vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)2,y2) (x) coordinates in the coordinate system of the upper right vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)3,y3) Coordinates in the coordinate system of a lower left vertex of a rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)4,y4) Representing coordinates of a lower right vertex of a rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x (t), y (t)) representing coordinates of a position point where the user's finger is in contact with the touch display screen at time t in the coordinate system;
step S303, comparing the ratio with the preset percentage, if the ratio is equal to the preset percentage and the contact duration of the finger of the user and the current position point of the touch display screen is greater than or equal to a preset duration threshold, determining that the data of the Internet of things is not illegally tampered, otherwise, determining that the data of the Internet of things is illegally tampered;
step S304, after the data of the Internet of things are determined to be illegally tampered, the terminal of the Internet of things is switched to a dormant locking state, and meanwhile, a corresponding data tampering alarm signal is sent to the cloud center of the Internet of things.
4. The system for monitoring illegal tampering of the data of the Internet of things is characterized by comprising an Internet of things data acquisition and conversion module, a first judgment module, a second judgment module, a third judgment module and an alarm module; wherein the content of the first and second substances,
the Internet of things data acquisition and conversion module is used for acquiring Internet of things data contained in an Internet of things terminal and correspondingly converting the Internet of things data into binary form data;
the first judging module is used for analyzing the binary form data so as to determine whether the data of the Internet of things is modified or not, and when the data of the Internet of things is determined not to be modified, the data of the Internet of things is determined not to be illegally tampered;
the second judging module is used for determining whether a user modifying the data of the Internet of things belongs to a legal authorized user or not when the data of the Internet of things is determined to be modified, and determining that the data of the Internet of things is not illegally tampered when the user belongs to the legal authorized user;
the third judging module is used for indicating the user to carry out verification operation on a mobile terminal connected with the Internet of things terminal when the user does not belong to a legal authorized user, and judging whether the Internet of things data is illegally modified according to the result of the verification operation;
the alarm module is used for carrying out alarm operation according to the judgment result of the third judgment module;
the internet of things data acquisition and conversion module is used for acquiring internet of things data contained in the internet of things terminal, and correspondingly converting the internet of things data into binary form data specifically comprises the following steps:
randomly collecting uplink or downlink Internet of things data of an Internet of things terminal, and correspondingly converting the Internet of things data into binary form data;
and the number of the first and second groups,
the first judging module is configured to analyze the binary form data to determine whether the internet of things data is modified, and when the internet of things data is determined not to be modified, determining that the internet of things data is not illegally tampered specifically includes:
equally dividing the data transmission duration corresponding to the data of the Internet of things into a plurality of data transmission time intervals, and then dividing the binary form data into a plurality of binary data elements corresponding to each data transmission time interval;
determining whether the data of the Internet of things is modified or not by using the following formula (1),
Figure FDA0003678614390000051
in the above formula (1), Q represents a determination value for determining whether the internet of things data is modified, when Q is 1, the internet of things data is modified, when Q is 0, the internet of things data is not modified, T represents a time length corresponding to a data transmission time interval, and Si(kT) denotes the ith binary data element, S, corresponding to the kth data transmission time intervali[(k-1)T]The method comprises the steps of representing the ith binary data element corresponding to the (k-1) th data transmission time interval, representing the total number of the binary data elements by n, representing a unit impulse function by delta { }, wherein the function value of the unit impulse function is 1 when the numerical value in the brackets is equal to 0, and the function value of the unit impulse function is 0 when the numerical value in the brackets is not equal to 0.
5. The illegal tampering monitoring system for data of the internet of things according to claim 4, characterized in that:
the second judging module is configured to determine whether a user who modifies the internet of things data belongs to a legal authorized user when the internet of things data is determined to be modified, and determine that the internet of things data is not illegally modified when the user belongs to the legal authorized user specifically includes:
if the data of the Internet of things is determined to be modified, obtaining login information of a user who modifies the data of the Internet of things for logging in the terminal of the Internet of things, wherein the login information comprises a user name and a login password; then the user name and the login password are respectively converted into a user name in a binary character string form and a login password in a binary character string form;
then, the following formula (2) is utilized, whether the user modifying the data of the Internet of things belongs to a legal authorized user is determined according to the login information,
Figure FDA0003678614390000061
in the above formula (2), η represents a determination value for determining whether or not a user who modifies the data of the internet of things belongs to a legitimate authorized user, and when η is 1, it represents that the user who modifies the data of the internet of things belongs to a legitimate authorized user, and when η is 0, it represents that the user who modifies the data of the internet of things does not belong to a legitimate authorized user, and YdA d-th character, M, in the user name in the form of a binary string representing the user currently modifying the data of the Internet of thingsdA d-th character, Y, in the login password in the form of a binary string representing a user currently modifying the data of the Internet of thingsa,dM-th character in the user name in the form of a binary character string representing the a-th predetermined legally authorized usera,dThe method comprises the steps that the number D of characters in a binary character string form of an a-th preset legal authorized user is represented, A represents the total number of preset legal authorized users, D represents a user name in the binary character string form or the character length of the binary character string form of a login password, delta { } represents a unit impulse function, when a numerical value in brackets is equal to 0, the function value of the unit impulse function is 1, and when the numerical value in brackets is not equal to 0, the function value of the unit impulse function is 0.
6. The illegal tampering monitoring system for data of the internet of things according to claim 5, characterized in that:
the third judging module is configured to, if the user does not belong to a legal authorized user, instruct the user to perform a verification operation on a mobile terminal connected to the internet of things terminal, and judge whether the internet of things data is illegally modified according to a result of the verification operation, specifically including:
if the user does not belong to a legal authorized user, indicating the user to upload a telephone number corresponding to the mobile terminal, if the telephone number belongs to a certain telephone number in a preset authorized white list, determining that the data of the Internet of things is not illegally tampered, and if the telephone number does not belong to the telephone number in the preset authorized white list, sending a verification operation instruction to the mobile terminal;
then, according to the verification operation instruction, the mobile terminal is instructed to display a sliding progress bar on a touch display screen of the mobile terminal, and the user is instructed to slide the sliding progress bar to a position of a preset percentage of the total length of the sliding progress bar; determining a ratio between a length of a rectangular area through which the sliding progress bar is slid after the user slides the sliding progress bar and a total length of the sliding progress bar using the following formula (3),
Figure FDA0003678614390000071
in the above formula (3), λ (t) represents a ratio between a length of a rectangular region through which the sliding progress bar slides and a total length of the sliding progress bar corresponding to t time in a sliding process of the sliding progress bar performed by the user, a lower left corner vertex of the touch display screen is used as an origin, a right side of the touch display screen in the width direction is an X axis, and an upper side of the touch display screen in the length direction is a Y axis to construct a corresponding coordinate system, (X) where1,y1) (x) coordinates in the coordinate system of the top left vertex of the rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)2,y2) Representing the sliding progress after sliding the sliding progress bar to a position of a preset percentage of the total length of the sliding progress barCoordinates in the coordinate system of the upper right vertex of the rectangular area through which the bar is slid, (x)3,y3) (x) coordinates in the coordinate system of a lower left vertex of a rectangular area through which the sliding progress bar is slid after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x)4,y4) Representing coordinates of a lower right vertex of a rectangular area through which the sliding progress bar is slid in the coordinate system after the sliding progress bar is slid to a position of a preset percentage of the total length of the sliding progress bar, (x (t), y (t)) representing coordinates of a position point where the user's finger is in contact with the touch display screen at time t in the coordinate system;
finally, comparing the ratio with the preset percentage, if the ratio is equal to the preset percentage and the contact duration of the finger of the user and the current position point of the touch display screen is greater than or equal to a preset duration threshold, determining that the data of the Internet of things is not illegally tampered, and otherwise, determining that the data of the Internet of things is illegally tampered;
and the number of the first and second groups,
the alarm module is used for carrying out alarm operation according to the judgment result of the third judgment module, and specifically comprises the following steps:
and when the data of the Internet of things is determined to be illegally tampered, switching the terminal of the Internet of things to a dormant locking state, and meanwhile sending a corresponding data tampering alarm signal to the cloud center of the Internet of things.
CN202110710989.5A 2021-06-25 2021-06-25 Internet of things data illegal tampering monitoring method and system Active CN113507510B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110710989.5A CN113507510B (en) 2021-06-25 2021-06-25 Internet of things data illegal tampering monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110710989.5A CN113507510B (en) 2021-06-25 2021-06-25 Internet of things data illegal tampering monitoring method and system

Publications (2)

Publication Number Publication Date
CN113507510A CN113507510A (en) 2021-10-15
CN113507510B true CN113507510B (en) 2022-07-15

Family

ID=78010741

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110710989.5A Active CN113507510B (en) 2021-06-25 2021-06-25 Internet of things data illegal tampering monitoring method and system

Country Status (1)

Country Link
CN (1) CN113507510B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844901A (en) * 2016-05-23 2016-08-10 光科技股份有限公司 Security energy efficiency monitoring terminal based on tamper-proof technology and monitoring method of security energy efficiency monitoring terminal
CN108235276A (en) * 2018-01-16 2018-06-29 冼钇冰 Sensor node operating system and sensor node operation method based on Internet of Things
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
CN112560111A (en) * 2020-12-11 2021-03-26 中盈优创资讯科技有限公司 Time sequence data acquisition tamper-proofing method and device suitable for Internet of things
CN112733205A (en) * 2021-01-20 2021-04-30 天地(常州)自动化股份有限公司 Data tampering rapid identification method, device, equipment and medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4898823B2 (en) * 2006-10-20 2012-03-21 パナソニック株式会社 Application information alteration monitoring device and method
US10332243B2 (en) * 2016-12-12 2019-06-25 International Business Machines Corporation Tampering detection for digital images
WO2021003738A1 (en) * 2019-07-11 2021-01-14 深圳大学 Collaborative physical layer authentication method and system based on received signal power

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844901A (en) * 2016-05-23 2016-08-10 光科技股份有限公司 Security energy efficiency monitoring terminal based on tamper-proof technology and monitoring method of security energy efficiency monitoring terminal
CN108235276A (en) * 2018-01-16 2018-06-29 冼钇冰 Sensor node operating system and sensor node operation method based on Internet of Things
CN109981682A (en) * 2019-04-10 2019-07-05 北京阿尔山区块链联盟科技有限公司 Data verification method, the apparatus and system of internet of things equipment
CN112560111A (en) * 2020-12-11 2021-03-26 中盈优创资讯科技有限公司 Time sequence data acquisition tamper-proofing method and device suitable for Internet of things
CN112733205A (en) * 2021-01-20 2021-04-30 天地(常州)自动化股份有限公司 Data tampering rapid identification method, device, equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Trustworthiness Management in the Social Internet of Things;Michele Nitti等;《IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING》;20140531;第26卷(第5期);1253-1265 *

Also Published As

Publication number Publication date
CN113507510A (en) 2021-10-15

Similar Documents

Publication Publication Date Title
CN107888554B (en) Method and device for detecting server attack
CN108718298B (en) Malicious external connection flow detection method and device
EP2069993A2 (en) Security system and method for detecting intrusion in a computerized system
CN104778387B (en) Cross-platform identity authorization system and method based on man-machine interaction behavior
CN106657057A (en) Anti-crawler system and method
CN112765578B (en) Method for realizing safety privacy calculation based on browser client
CN109413047B (en) Behavior simulation judgment method, behavior simulation judgment system, server and storage medium
CN112699357A (en) Big data security system access operation platform and data retrieval method
CN113610156A (en) Artificial intelligence model machine learning method and server for big data analysis
CN109995751B (en) Internet access equipment marking method and device, storage medium and computer equipment
CN113507510B (en) Internet of things data illegal tampering monitoring method and system
CN101980477B (en) Method and device for detecting number of shadow users, and network equipment
CN111814121B (en) Login authentication management system and method based on computer system
CN111949992A (en) Automatic safety monitoring method and system for WEB application program
CN109873836A (en) A kind of methods of risk assessment and device of data
CN114629711B (en) Method and system for detecting special Trojan horse on Windows platform
CN113919239B (en) Intelligent internal threat detection method and system based on space-time feature fusion
CN112272195B (en) Dynamic detection authentication system and method thereof
CN114298714A (en) Account identity authentication method and device, electronic equipment and storage medium
Tian et al. A method for anomaly detection of user behaviors based on machine learning
CN112995128A (en) Interface information automatic verification assembly and method based on artificial intelligence
CN112149095B (en) Student data safety management method and system
CN114666164B (en) Computer network user identity login verification system and method
CN117254960B (en) Detection method for detecting API interface verification risk from flow data
CN112785130B (en) Website risk level identification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant