CN104618317A - Trust based Internet of Things data security system - Google Patents

Trust based Internet of Things data security system Download PDF

Info

Publication number
CN104618317A
CN104618317A CN201410377226.3A CN201410377226A CN104618317A CN 104618317 A CN104618317 A CN 104618317A CN 201410377226 A CN201410377226 A CN 201410377226A CN 104618317 A CN104618317 A CN 104618317A
Authority
CN
China
Prior art keywords
internet
network
things
security
security system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410377226.3A
Other languages
Chinese (zh)
Inventor
陈勇
陈娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU WOOTIDE INFORMATION TECHNOLOGY Co Ltd
Original Assignee
JIANGSU WOOTIDE INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU WOOTIDE INFORMATION TECHNOLOGY Co Ltd filed Critical JIANGSU WOOTIDE INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410377226.3A priority Critical patent/CN104618317A/en
Publication of CN104618317A publication Critical patent/CN104618317A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Abstract

The invention provides a trust based Internet of Things data security system. The system comprises an Internet of Things network platform, a central end security device and a network management service center; the Internet of Things network platform includes three layers, namely, the bottom wireless personal area network, the medium WIMAX wireless network and the upper metropolitan area network; the metropolitan area network is communicated with the central end security device and the network management service center. According to the trust based Internet of Things data security system, a brand-new Internet of Things network architecture is designed according to the characteristics of the Internet of Things network, so that the investment and construction cost can be saved, and the Internet of Things network security technology can be achieved; the security and protection measures are performed for the system from inside to outside in a sequence, representing by terminal security, communication security, application security and security management; multi-layer security assurance systems are allocated according to the confidently, the integrity, the reality and the non-repudiation, other security mechanisms of data as well as management.

Description

A kind of Internet of Things data security system based on trusting
Technical field
The present invention relates to Internet of Things field, be specifically related to Internet of Things data security system.
Background technology
The trust management system of Internet of Things has received the concern of a lot of scholar, this is proposed to a lot of trust management systems, but these systems have a lot of limitation places, as: the finite energy that can not meet Internet of Things, the more important thing is and can not meet large-scale Internet of Things.As far as we know, Internet of Things trust management lack the consideration of utilance to resource energy and reliability.
The GTMS that Shaikh etc. propose, more pay close attention to the calculating with the trust value of individuality relative to traditional trust framework, the advantage of this method is that each node has little memory space.But it relies on the information of removing to collect bunch head based on the strategy of broadcasting, and this just needs a large amount of resources and energy.
Bao etc. propose HTMP, the trust management of a layering, its consider two aspects trust value, social trust and service quality trust value, the acquisition of trust value is the trust based on node location, but the amount of calculation of each node is too large, and the realization for Internet of Things is unpractical.
The TCHEM that Crosby etc. propose, based on the faith mechanism of election of cluster head, the framework of this scheme is the ID that each node has only, and this method can reduce catches node and become leader cluster node, but this method, because trust management is not introduced, can not cover the details of trust value.
Boukerche etc. propose ATRM, a kind of based on agency and recommend trust and credit management framework, here refer to a mobile agent and manage local trust and reputation, the calculating of therefore trusting and propagate and do not have the execution of time delay, supposes that mobile agent is attempted to steal to malicious node or amendment information is resilient here.In numerous applications, this hypothesis is irrealizable.
Summary of the invention
The technical problem to be solved in the present invention overcomes existing defect, and provide a kind of Internet of Things data security system based on trusting, little communication overhead, only needs little position at inter-node transmission trust value, so be conducive to saving transmission and saving energy.
In order to solve the problems of the technologies described above, the invention provides following technical scheme:
The invention provides a kind of Internet of Things data security system based on trusting to be made up of the Internet of Things network platform, center-side safety means and network management services center, the described Internet of Things network platform is made up of three levels, the i.e. metropolitan area network on the Wireless Personal Network of bottom, the WIMAX wireless network in intermediate layer and upper strata, described metropolitan area network is communicated with center-side safety means and network management services center.
Further, described Wireless Personal Network is made up of multiple independence territory net, and each independence territory net contains a telegon.
Further, a described independence territory net, is made up of telegon and 1 to 1024 transducer, wherein, and the neighbor node router each other of 1 to 1024 transducer.
Further, described telegon is a main control device for territory net, and telegon and 1024 transducer compositions independently individual territory net, be operated in 2.4G frequency band, in accordance with IEEE802.15.4 agreement and ZigBeePro procotol; 1024 transducers can router each other, jump through network calculations and redirect switching 5, extend transmission distance and can reach 300 meters, information transmit delay time is less than 2 seconds, each sensor information arrives telegon through redirect routing function or direct (clear situation), then delivers to WIMAX wireless network; Described sensor terminal is in resting state at ordinary times, when there being perceptual signal, automatically wakes sensor device up, makes transducer forward transmission operating state to; Send perceptual signal by yellow, red classification, red perceptual signal is preferentially forced to send, and after center deciphering machine is decrypted, send corresponding department to process.In order to realize the digital encryption system of perception information, first must carry out the digitized processing of perception data, analog signal is become digital signal, namely A/D conversion being carried out to perceptual signal, by the read-write of CPU Master control chip to perception data; After security module carries out sensing data encryption, radio-frequency (RF) transceiver is encrypted the work such as transmission and reception of data.
Further, described transducer comprises sensor senses device, CPU and radio-frequency (RF) transceiver, security module and antenna, and wherein, CPU and radio-frequency (RF) transceiver are connected with sensor senses device, security module and antenna respectively.
Store based on the device authentication key data identified, main information and key management information in the chip of described security module; this security module is provided with encipherment protection mechanism and the anti-tamper measure of information; to guarantee that security module internal information third party cannot read, ensure that can not the distorting of security module internal data, counterfeit.After user obtains safety sensor, perception data transfer function can be realized.
Described transducer adopts standardized designs, makes transducer become omnipotent standard security sensor device, as long as change perception device just can realize the detection control of different perception information and the safe transmission of perception information.
Wherein, described WIMAX wireless network by some CPE (indoor outer terminal equipment) and converge base station form.
Further, described independence territory net telegon by CPE with converge base station communication, described convergence base station UNICOM metropolitan area network.
Further, described CPE is arranged in distance telegon 2.5 kilometer range.
Further, described CPE is arranged in the scope of convergence base station radius 8 kilometers.
Described WIMAX wireless network is operated in 5.8GH frequency band, in accordance with IEEE802.16 agreement, task is collected in the covering that this net completes sensor information, first the sensor information of the telegon in collection 1.5 kilometer range is received by indoor or outdoors unit CPE (indoor outer terminal equipment), deliver to WIMAX base station again, WIMAX breathes out base station the CPE data receiving collection 5 kilometer range, sensor information is delivered to metropolitan area network in base station by WIMAX again, metropolitan area network is built municipal fiber optic communication network, sensor information is sent to security control center by metropolitan area network, be decrypted by center cipher machine, the rear information of deciphering is delivered to corresponding department and is processed.
Wherein, described center-side safety means and network management services center comprise center cipher machine, authenticate key administrative center, data server, safety database and PC terminal.
Described authenticate key administrative center is authoritative department Ye Shi Third Party Authentication department, the management of this center unified management, the responsible making to all the sensors terminal key, distribution, key and the device authentication management based on mark.Ensure uniqueness and the correctness of each sensor user key.The functions such as the authority that described authenticate key administrative center also has centralized management, off-line is distributed and regular, irregular online replacing key.Implement and use key material produced, register, certification, distribution, installation, storage, filing, destruction service, KMC, according to security strategy, implements the management to key.The described cipher key content based on mark not only disperses to be stored in sensor safe inside modules, is also stored in KMC, when buying safety sensor, should get sensor device by " system of real name " to appointment key authentication administrative center.
Described center cipher machine, in order to solve the decipher function of magnanimity sensor terminal concurrent data, adopts high-performance, and the high speed password machine equipment based on data flow encryption and decryption treatment mechanism is real to be seen the synchronous decipher function of mass data flow; In upper strata is called, optimize encryption dispatching algorithm, adopt multithreading, the legitimacy realizing carrying out magnanimity transducer low speed data certification and equipment detects and the function such as sensor terminal decrypt data.
Point level security means such as described safety database service system configuration classification rights management mechanism, secret key safety storage, cipher key destruction, device authentication, access control, Backup and Restore.System have employed decentralization power mechanism in rights management, and setting data library manager and safety officer realize the reading to sensitive data jointly.Introduce audit administrator simultaneously, to the access of sensitive information, record of the audit is carried out to the behavior of safety officer and database user, ensure the safety of sensitive data.
Further, need to be connected isolator when described center-side safety means are connected with metropolitan area network with network management services center, firewall box and vulnerability scanning intrusion detection module.
Described network management services center is the Internet of Things network operation, Wireless Communication Equipment is safeguarded, sensor device is safeguarded, the automatic management of online management and equipment provides monitoring and safeguards.
A kind of Internet of Things data security system based on trusting provided by the invention, according to the feature of internet of things, devise brand-new network architecture of Internet of things to reduce investment outlay, construction cost achieve Internet of Things network security technology; System sets up safety prevention measure from inside to outside successively, is mainly reflected in terminal security, communication security, application safety and safety management; Multi-level efficient public security system is disposed in the confidentiality of data, integrality, the aspect such as security mechanism and management such as authenticity and non repudiation.
Accompanying drawing explanation
Accompanying drawing is used to provide a further understanding of the present invention, and forms a part for specification, together with embodiments of the present invention for explaining the present invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the network architecture of Internet of things schematic block diagram with safety system of the present invention;
Fig. 2 is an independence of the present invention territory net composition structural representation;
Fig. 3 is transducer of the present invention composition structural representation;
Fig. 4 is thing wireless personal area network architecture schematic diagram of the present invention;
Fig. 5 is Internet of Things safety means of the present invention and isolator, fire compartment wall connection diagram;
Fig. 6 is center-side safety means of the present invention and network management services center composition schematic block diagram.
Wherein, 101-transducer, 103-Wireless Personal Network, 104-WIMAX wireless network, 105-metropolitan area network, 106-center-side safety means and network management services center, 202-center cipher machine, 203-authenticate key administrative center, 204-data server, 205-safety database, 206-PC network terminal, 302-converge base station, 303-CPE, 305-telegon, 402-isolator, 403-firewall box, 404-vulnerability scanning intrusion detection module, 501-sensor senses device, 502-CPU and radio-frequency (RF) transceiver, 503-security module, 504-antenna.
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein is only for instruction and explanation of the present invention, is not intended to limit the present invention.
Embodiment one
Be illustrated in figure 1 and the invention provides a kind of Internet of Things data security system based on trusting, comprise the Internet of Things network platform, center-side safety means and network management services center 106, as shown in Figure 1, the described Internet of Things network platform is made up of three levels, and namely bottom is with the Wireless Personal Network 103 of IEEE802.15.4 and ZigBeePro protocol realization; The intermediate layer WIMAX wireless network 104 of IEEE802.16 protocol realization; Upper strata is metropolitan area network (built government municipal administration optical networking) 105.
Further, described Wireless Personal Network 103 is made up of multiple independence territory net.
As shown in Figure 2, a described independence territory net, is made up of telegon 305 and 1 to 1024 transducer 101, wherein, and the neighbor node router each other of 1 to 1024 transducer 101.
As shown in Figure 3, described transducer 101 comprises sensor senses device 501, CPU and radio-frequency (RF) transceiver 502, strong and the antenna 504 of security module 503, wherein, CPU and radio-frequency (RF) transceiver 502 are connected with sensor senses device 501, security module 503 and antenna 504 respectively.
Further, described metropolitan area network 105 is communicated with center-side safety means and network management services center 106.
As shown in Figure 4, described WIMAX wireless network 104 is made up of with convergence base station 302 CPE303 of some.
The telegon 305 of a described independence territory net is communicated with convergence base station 302 by CPE303, described convergence base station 302 UNICOM metropolitan area network 105.Described CPE303 is arranged in 1.5 kilometer range of distance telegon 305.Described CPE302 is arranged in the scope of convergence base station 302 radius 5 kilometers.
As shown in Figure 5, need to be connected isolator 402 when described center-side safety means are connected with metropolitan area network 105 with network management services center 106, firewall box 403 and vulnerability scanning intrusion detection module 404.
A kind of Internet of Things data security system based on trusting is made up of the Internet of Things network platform, center-side safety means and network management services center, the described Internet of Things network platform is made up of three levels, the i.e. metropolitan area network on the Wireless Personal Network of bottom, the WIMAX wireless network in intermediate layer and upper strata, described metropolitan area network is communicated with center-side safety means and network management services center; Described Wireless Personal Network is made up of multiple independence territory net, and each independence territory net contains a telegon; A described independence territory net, is made up of telegon and 1 to 1024 transducer, wherein, and the neighbor node router each other of 1 to 1024 transducer.
Described telegon is a main control device for territory net, and telegon and 1024 transducer compositions independently individual territory net, be operated in 2.4G frequency band, in accordance with IEEE802.15.4 agreement and ZigBeePro procotol; 1024 transducers can router each other, jump through network calculations and redirect switching 5, extend transmission distance and can reach 300 meters, information transmit delay time is less than 2 seconds, each sensor information arrives telegon through redirect routing function or direct (clear situation), then delivers to WIMAX wireless network; Described sensor terminal is in resting state at ordinary times, when there being perceptual signal, automatically wakes sensor device up, makes transducer forward transmission operating state to; Send perceptual signal by yellow, red classification, red perceptual signal is preferentially forced to send, and after center deciphering machine is decrypted, send corresponding department to process.In order to realize the digital encryption system of perception information, first must carry out the digitized processing of perception data, analog signal is become digital signal, namely A/D conversion being carried out to perceptual signal, by the read-write of CPU Master control chip to perception data; After security module carries out sensing data encryption, radio-frequency (RF) transceiver is encrypted the work such as transmission and reception of data.
Described transducer comprises sensor senses device, CPU and radio-frequency (RF) transceiver, security module and antenna, and wherein, CPU and radio-frequency (RF) transceiver are connected with sensor senses device, security module and antenna respectively.
Store based on the device authentication key data identified, main information and key management information in the chip of described security module; this security module is provided with encipherment protection mechanism and the anti-tamper measure of information; to guarantee that security module internal information third party cannot read, ensure that can not the distorting of security module internal data, counterfeit.After user obtains safety sensor, perception data transfer function can be realized.
Described transducer adopts standardized designs, makes transducer become omnipotent standard security sensor device, as long as change perception device just can realize the detection control of different perception information and the safe transmission of perception information.
Wherein, described WIMAX wireless network by some CPE (indoor outer terminal equipment) and converge base station form; The telegon of a described independence territory net is by CPE and converge base station communication, described convergence base station UNICOM metropolitan area network; Described CPE is arranged in distance telegon 1.5 kilometer range; Described CPE is arranged in the scope of convergence base station radius 5 kilometers.
Described WIMAX wireless network is operated in 5.8GH frequency band, in accordance with IEEE802.16 agreement, task is collected in the covering that this net completes sensor information, first the sensor information of the telegon in collection 1.5 kilometer range is received by indoor or outdoors unit CPE (indoor outer terminal equipment), deliver to WIMAX base station again, WIMAX breathes out base station the CPE data receiving collection 5 kilometer range, sensor information is delivered to metropolitan area network in base station by WIMAX again, metropolitan area network is built municipal fiber optic communication network, sensor information is sent to security control center by metropolitan area network, be decrypted by center cipher machine, the rear information of deciphering is delivered to corresponding department and is processed.
Wherein, described center-side safety means and network management services center comprise center cipher machine, authenticate key administrative center, data server, safety database and PC terminal.
Described authenticate key administrative center is authoritative department Ye Shi Third Party Authentication department, the management of this center unified management, the responsible making to all the sensors terminal key, distribution, key and the device authentication management based on mark.Ensure uniqueness and the correctness of each sensor user key.The functions such as the authority that described authenticate key administrative center also has centralized management, off-line is distributed and regular, irregular online replacing key.Implement and use key material produced, register, certification, distribution, installation, storage, filing, destruction service, KMC, according to security strategy, implements the management to key.The described cipher key content based on mark not only disperses to be stored in sensor safe inside modules, is also stored in KMC, when buying safety sensor, should get sensor device by " system of real name " to appointment key authentication administrative center.
Described center cipher machine, in order to solve the decipher function of magnanimity sensor terminal concurrent data, adopts high-performance, and the high speed password machine equipment based on data flow encryption and decryption treatment mechanism is real to be seen the synchronous decipher function of mass data flow; In upper strata is called, optimize encryption dispatching algorithm, adopt multithreading, the legitimacy realizing carrying out magnanimity transducer low speed data certification and equipment detects and the function such as sensor terminal decrypt data.
Point level security means such as described safety database service system configuration classification rights management mechanism, secret key safety storage, cipher key destruction, device authentication, access control, Backup and Restore.System have employed decentralization power mechanism in rights management, and setting data library manager and safety officer realize the reading to sensitive data jointly.Introduce audit administrator simultaneously, to the access of sensitive information, record of the audit is carried out to the behavior of safety officer and database user, ensure the safety of sensitive data.
Described center-side safety means need to be connected isolator when being connected with metropolitan area network with network management services center, firewall box and vulnerability scanning intrusion detection module.
Described network management services center is the Internet of Things network operation, Wireless Communication Equipment is safeguarded, sensor device is safeguarded, the automatic management of online management and equipment provides monitoring and safeguards
A kind of Internet of Things data security system based on trusting provided by the invention, according to the feature of internet of things, devise brand-new network architecture of Internet of things to reduce investment outlay, construction cost achieve Internet of Things network security technology; System sets up safety prevention measure from inside to outside successively, is mainly reflected in terminal security, communication security, application safety and safety management; Multi-level efficient public security system is disposed in the confidentiality of data, integrality, the aspect such as security mechanism and management such as authenticity and non repudiation.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, although with reference to previous embodiment to invention has been detailed description, for a person skilled in the art, it still can be modified to the technical scheme described in foregoing embodiments, or carries out equivalent replacement to wherein portion of techniques feature.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. the invention provides a kind of Internet of Things data security system based on trusting, the described Internet of Things data security system based on trusting is made up of the Internet of Things network platform, center-side safety means and network management services center, wherein, the described Internet of Things network platform is made up of three levels, the i.e. metropolitan area network on the Wireless Personal Network of bottom, the WIMAX wireless network in intermediate layer and upper strata, described metropolitan area network is communicated with center-side safety means and network management services center.
2. a kind of Internet of Things data security system based on trusting according to claim 1, it is characterized in that: described Wireless Personal Network is made up of multiple independence territory net, each independence territory net contains a telegon.
3. a kind of Internet of Things data security system based on trusting according to claim 2, is characterized in that: a described independence territory net, is made up of telegon and 1 to 1024 transducer, wherein, and the neighbor node router each other of 1 to 1024 transducer.
4. a kind of Internet of Things data security system based on trusting according to claim 3, it is characterized in that: described transducer comprises sensor senses device, CPU and radio-frequency (RF) transceiver, security module and antenna, wherein, described CPU and radio-frequency (RF) transceiver are connected with sensor senses device, security module and antenna respectively.
5. a kind of Internet of Things data security system based on trusting according to claim 2, is characterized in that: described WIMAX wireless network is made up of multiple CPE and convergence base station, and IEEE802.16 Protocol Design is pressed in CPE and the convergence base station of WIMAX wireless network.
6. a kind of Internet of Things data security system based on trusting according to claim 5, is characterized in that: the telegon of a described independence territory net is by CPE and converge base station communication, described convergence base station UNICOM metropolitan area network.
7. a kind of Internet of Things data security system based on trusting according to claim 5, is characterized in that: described CPE is arranged in distance telegon 2.5 kilometer range.
8. a kind of Internet of Things data security system based on trusting according to claim 5, is characterized in that: described CPE is arranged in the scope of convergence base station radius 8 kilometers.
9. a kind of Internet of Things data security system based on trusting according to claim 1, is characterized in that: described center-side safety means and network management services center (106) comprise center cipher machine (202), authenticate key administrative center, data server, safety database and PC terminal.
10. a kind of Internet of Things data security system based on trusting according to claim 9, it is characterized in that: when described center-side safety means are connected with metropolitan area network with network management services center, be connected isolator, firewall box and vulnerability scanning intrusion detection.
CN201410377226.3A 2014-07-30 2014-07-30 Trust based Internet of Things data security system Pending CN104618317A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410377226.3A CN104618317A (en) 2014-07-30 2014-07-30 Trust based Internet of Things data security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410377226.3A CN104618317A (en) 2014-07-30 2014-07-30 Trust based Internet of Things data security system

Publications (1)

Publication Number Publication Date
CN104618317A true CN104618317A (en) 2015-05-13

Family

ID=53152596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410377226.3A Pending CN104618317A (en) 2014-07-30 2014-07-30 Trust based Internet of Things data security system

Country Status (1)

Country Link
CN (1) CN104618317A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141573A (en) * 2015-06-11 2015-12-09 杭州安恒信息技术有限公司 Security protection method and security protection system based on WEB access compliance auditing
CN105790934A (en) * 2016-03-04 2016-07-20 中国银联股份有限公司 Self-adaptive POS terminal configuration method and configuration rights transfer method of self-adaptive POS terminal
CN106161426A (en) * 2016-06-08 2016-11-23 北京工业大学 A kind of vulnerability scanning method being applied to industry Internet of Things
CN107895111A (en) * 2017-10-11 2018-04-10 西安电子科技大学 Internet of things equipment supply chain trust systems management method, computer program, computer
US10469517B1 (en) 2017-05-08 2019-11-05 Wells Fargo Bank, N.A. Centralized security for connected devices
CN113709726A (en) * 2021-07-23 2021-11-26 国网河北省电力有限公司信息通信分公司 Power Internet of things trust management method based on edge calculation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036231A (en) * 2010-09-07 2011-04-27 北京兵港科技发展有限公司 Network architecture security system for Internet of Things and security method thereof
CN201898525U (en) * 2010-08-24 2011-07-13 北京兵港科技发展有限公司 IOT (Internet of Things) network architecture with safety system
US20120236759A1 (en) * 2011-03-14 2012-09-20 Hon Hai Precision Industry Co., Ltd. Wimax customer premises equipment and method for setting parameter identities thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201898525U (en) * 2010-08-24 2011-07-13 北京兵港科技发展有限公司 IOT (Internet of Things) network architecture with safety system
CN102036231A (en) * 2010-09-07 2011-04-27 北京兵港科技发展有限公司 Network architecture security system for Internet of Things and security method thereof
US20120236759A1 (en) * 2011-03-14 2012-09-20 Hon Hai Precision Industry Co., Ltd. Wimax customer premises equipment and method for setting parameter identities thereof

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141573A (en) * 2015-06-11 2015-12-09 杭州安恒信息技术有限公司 Security protection method and security protection system based on WEB access compliance auditing
CN105141573B (en) * 2015-06-11 2018-12-04 杭州安恒信息技术有限公司 A kind of safety protecting method and system based on WEB access compliance audit
CN105790934A (en) * 2016-03-04 2016-07-20 中国银联股份有限公司 Self-adaptive POS terminal configuration method and configuration rights transfer method of self-adaptive POS terminal
CN105790934B (en) * 2016-03-04 2019-03-15 中国银联股份有限公司 A kind of adaptive POS terminal configuration method configures power assignment method with it
CN106161426A (en) * 2016-06-08 2016-11-23 北京工业大学 A kind of vulnerability scanning method being applied to industry Internet of Things
US10469517B1 (en) 2017-05-08 2019-11-05 Wells Fargo Bank, N.A. Centralized security for connected devices
CN107895111A (en) * 2017-10-11 2018-04-10 西安电子科技大学 Internet of things equipment supply chain trust systems management method, computer program, computer
CN107895111B (en) * 2017-10-11 2021-06-11 西安电子科技大学 Internet of things equipment supply chain trust system management method, computer program and computer
CN113709726A (en) * 2021-07-23 2021-11-26 国网河北省电力有限公司信息通信分公司 Power Internet of things trust management method based on edge calculation

Similar Documents

Publication Publication Date Title
Gunduz et al. Cyber-security on smart grid: Threats and potential solutions
CN111478902B (en) Power edge gateway equipment and sensing data uplink storage method based on same
CN102036231B (en) Network architecture security system for Internet of Things and security method thereof
CN101094056B (en) Security system of wireless industrial control network, and method for implementing security policy
CN104618317A (en) Trust based Internet of Things data security system
Yang et al. A multi-layer security model for internet of things
CN103491072B (en) A kind of border access control method based on double unidirection insulation network brakes
US8918639B2 (en) Smarter leveraging of the power grid to substantially improve security of distributed systems via a control plane data communication network over the smart power grid
CN102497581B (en) Digital-certificate-based video monitoring data transmission method and system
CN103200185B (en) Data safe transmission method in a kind of body area network system
CN110535653A (en) A kind of safe distribution terminal and its means of communication
Fan et al. Security challenges in smart-grid metering and control systems
CN108173344A (en) LORA wireless communication techniques are in the application process of low-voltage distribution transformer platform district
CN102752306B (en) Digital media management method and system based on mark
CN201898525U (en) IOT (Internet of Things) network architecture with safety system
CN110972136A (en) Internet of things safety communication module, terminal, safety control system and authentication method
CN110798474A (en) Power data transmission safety protection system based on Beidou short message communication mode
CN109617875A (en) A kind of the secure accessing platform and its implementation of terminal communication network
CN113254947A (en) Vehicle data protection method, system, equipment and storage medium
Abdallah et al. Security and privacy in smart grid
Fuloria et al. The protection of substation communications
CN102056163B (en) Distributed mesh network key management method and wireless access point device
CN114531942A (en) Intelligent power grid measuring method
Zhang et al. High-speed railway environmental monitoring data identity authentication scheme based on consortium blockchain
CN102404324A (en) System for sensing safety of node data of Internet of things

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 212000 Zhenjiang province Jiangsu city Zhenjiang District Dingmao Road No. 468 Gemini twelve building A room 05-2300

Applicant after: Science and Technology Co., Ltd. is swum in Jiangsu at once

Address before: 212000 Zhenjiang province Jiangsu city Zhenjiang District Dingmao Road No. 468 Gemini twelve building A room 05-2300

Applicant before: Jiangsu Wootide Information Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: JIANGSU WOOTIDE INFORMATION TECHNOLOGY CO., LTD. TO: JIANGSU MASHANGYOU TRAVEL TECHNOLOGY CO., LTD.

CB02 Change of applicant information

Address after: 212000 Zhenjiang province Jiangsu city Zhenjiang District Dingmao Road No. 468 Gemini twelve building A room 05-2300

Applicant after: Polytron Technologies Inc travel

Address before: 212000 Zhenjiang province Jiangsu city Zhenjiang District Dingmao Road No. 468 Gemini twelve building A room 05-2300

Applicant before: Science and Technology Co., Ltd. is swum in Jiangsu at once

COR Change of bibliographic data
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150513