CN107846660A - A kind of Internet of Things method for transmitting signals and system based on wireless network - Google Patents

A kind of Internet of Things method for transmitting signals and system based on wireless network Download PDF

Info

Publication number
CN107846660A
CN107846660A CN201711373249.7A CN201711373249A CN107846660A CN 107846660 A CN107846660 A CN 107846660A CN 201711373249 A CN201711373249 A CN 201711373249A CN 107846660 A CN107846660 A CN 107846660A
Authority
CN
China
Prior art keywords
user
anonymous
section
internet
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711373249.7A
Other languages
Chinese (zh)
Inventor
柯钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Polytechnic
Original Assignee
Dongguan Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Polytechnic filed Critical Dongguan Polytechnic
Priority to CN201711373249.7A priority Critical patent/CN107846660A/en
Publication of CN107846660A publication Critical patent/CN107846660A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters

Abstract

The invention belongs to the Internet of Things communications field, disclose a kind of Internet of Things method for transmitting signals and system based on wireless network, the first logging request for carrying the first instant communication users and identifying from the first user terminal is received by wireless network, and completes the login Authorized operation to first user terminal;The second logging request for carrying device identification from network access equipment is received, and completes the login Authorized operation to the network access equipment;Instant messaging transmission channel is established according to first instant communication users mark of the first association and device identification;Transfer etc. is carried out to the network signal transmitted between the first user terminal and the network access equipment by instant messaging transmission channel.Internet of Things communication means provided by the invention based on wireless network, establishes Internet of Things on the basis of the instant communication resource, at utmost make use of existing superior resource, greatly reduces the cost of exploitation and application Internet of Things.

Description

A kind of Internet of Things method for transmitting signals and system based on wireless network
Technical field
The invention belongs to the Internet of Things communications field, more particularly to a kind of Internet of Things method for transmitting signals based on wireless network And system.
Background technology
At present, Internet of Things is the important component of generation information technology, and its English name is " TheInternetof Things ", refer to the connected internet of thing thing.The core of Internet of Things and basis are still internet, are on Internet basic Extension and extension network, Internet of Things causes internet based on user terminal to extend and extend between article and article Information exchanges and communication.There are some to study and apply in terms of Internet of Things at present, passed through and biography is implanted into some objects Sensor is connected with central server to realize Internet of Things, such central server can and the various objects for implanting sensor Interconnect.
However, the Internet of Things scheme for the object for implanting sensor is managed, it is necessary to center by central server at present Server admin, cost are too high, it is difficult to are applied to civil area.
The method for avoiding cognitive radio networks under attack is generally:Utilized in the cognitive radio networks of DB drivings The blind factor hides the positional information of user, while proposes that a kind of frequency spectrum based on prediction uses agreement, by selecting state more steady Fixed channel switches to reduce, so as to reduce the probability that attacker successfully infers cognitive user positional information.
But the above method needs to judge the stabilization of channel according to the frequency of use of each cognitive user storage available channel Property after, using channel degree of stability carry out Channel assignment, operation it is more complicated, be not easy to people use.
In summary, the problem of prior art is present be:Need central server management, cost is too high, it is difficult to is applied to Civil area, the needs of user can not be met.
The content of the invention
The problem of existing for prior art, the invention provides a kind of Internet of Things signal transmission side based on wireless network Method and system.
The present invention is achieved in that a kind of Internet of Things method for transmitting signals based on wireless network, including:
First stepped on by what wireless network received carrying from the first user terminal the first instant communication users identify Record request, and complete the login Authorized operation to first user terminal;Carrying from network access equipment is received to set Second logging request of standby mark, and complete the login Authorized operation to the network access equipment;
Instant messaging is established according to first instant communication users mark of the first association and the device identification Transmission channel;By the instant messaging transmission channel to being transmitted between first user terminal and the network access equipment Network signal carry out transfer;
Receive the facility information for the network access equipment that first user terminal is obtained and sent;
Identified according to the facility information distributing equipment, and establish the first instant communication users mark and the equipment First association of mark;
The device identification is passed to by the network access equipment by first user terminal;
When first user terminal is got and the of first instant communication users mark with social networks chain After two instant communication users mark, receive and carry the device identification and described second transmitted by first user terminal The collaborative share request of instant communication users mark;
Asked to identify the second user terminal logged in hair to second instant communication users according to the collaborative share The collaborative share is sent to ask;
Receive the second user terminal and the shared feedback of returned accepting device is asked according to the collaborative share Afterwards, establish the device identification and second instant communication users identify second associates;
Receive the equipment operating data for the corresponding device attribute that the network access equipment periodically reports;
Detect that the equipment operating data meets to trigger predetermined registration operation during preset trigger condition;
Receive the association for carrying device identification that first user terminal is sent and release request;
Request is released according to the association and releases first association and/or second association;
The wireless network connects the login Authorized operation to the network access equipment, including:1) authentication center CA is generated Random number sequence matrix R, R={ Rmn }, (1≤m≤N), (1≤n≤N);CA calculates hash Hash matrix Hs according to R and sends out H Deliver to database D B;M × n random number is randomly assigned to M cognitive user by R by CA with behavior unit, and cognitive user SUj is obtained The random number sequence set note Rj (1≤j≤M) obtained, goes to step 2);
2):Base station BS js of the SUj by control channel into the region Cj where it, send the channel request information of encryption EBSj (Rj1, t), t are the time, go to step 3);
3):BSj collects all EBSj that t receives and decrypts the sequence string received, obtains a series of secondary user Information R times;BSj is each R times tagged rear re-encrypted, and each R times label and corresponding random number information are formed Encryption information;BSj sends each R times encryption information to DB, goes to step 4);
4):After random number in encryption information is decrypted DB, the hash value that random number is calculated in Hash is carried out, with After the hash value of machine number matches with H hash value, the user of corresponding label passes through checking;DB is by the label and Cj by checking Usable spectrum information encrypt and to form available channel information after, send to BSj, DB and delete the hash value matched in H, go to step It is rapid 5);
5):BSj is to distribute channel by the cognitive user of checking according to available channel information, goes to step S6;
6):BSj registration channel use informations in DB;
First logging request of first user terminal, including:
Step 1, user send location Based service to anonymous server and asked, identity of the service request including user, The geographical coordinate of user, at the time of send request, the privacy requirements of the content of request and user;Privacy requirements refer to user couple The requirement of user's number in the anonymous section of anonymous server generation;
Step 2, anonymous server initialization;
Step 3, generate initial anonymous region;Anonymous server receives user's request, generates initial anonymous region, statistics Current time initially in anonymous section all request users numbers;
Step 4, predict the successful probability of user anonymity;
Step 5, returns to Query Result, and the user after processing is asked R', is sent to offer location-based service by anonymous server Server;Anonymous server obtains Query Result set from the server for providing location-based service;Anonymous server is according to user Actual position the Query Result of most suitable user is picked out from Query Result set, and return result to request service User.
Further, the Internet of Things method for transmitting signals based on wireless network also includes:
Identified according to the first instant communication users and log in Internet of Things service platform;
By the Internet of Things service platform obtain with first instant communication users mark have first associate set Standby mark;
Network insertion according to the device identification with logging in the Internet of Things service platform with the device identification is set It is standby to establish the instant messaging transmission channel that transfer is carried out by the Internet of Things service platform;
The transmission of network signal is carried out by the instant messaging transmission channel and the network access equipment;
Obtain the facility information of network access equipment;
The facility information is sent to the Internet of Things service platform, the Internet of Things service platform is set according to Standby information distributing equipment identifies, and establishes the first instant communication users mark and associated with the first of the device identification;
Receive the device identification that the Internet of Things service platform is fed back and be sent to the network access equipment, it is described to set It is standby to identify for making the network access equipment log in the Internet of Things service platform according to the device identification;
Obtain and identified with second instant communication users of first instant communication users mark with social networks chain;It is logical The Internet of Things service platform is crossed to the user that the Internet of Things service platform is logged in second instant communication users mark Terminal sends the collaborative share request for carrying the device identification, the Internet of Things service platform is being received the user After the shared feedback of accepting device that terminal returns, the of the device identification and second instant communication users mark is established Two associations;
The Internet of Things service platform is received in the corresponding device category for detecting that the network access equipment periodically reports The equipment operating data of property meets presetting message transmitted during preset trigger condition;
The association releasing request for carrying device identification is sent to the Internet of Things service platform, makes the Internet of Things service Platform releases request according to the association and releases first association and/or second association;
Further, step 2 specifically includes:
The first step, anonymous server generate a file, store the coordinate of the central point of every road in road network, in Heart coordinate is a two-dimensional coordinate, the as transverse and longitudinal coordinate of central point, every road herein be defined as on this section except Outside the crossing at both ends, the stretch without other crossings;
Second step, calculate crossing probability transfer matrix;Probability transfer matrix is as follows:
Wherein, M (v) represents the probability transfer matrix of crossing v in road network, and subscript 1 to n represents to contain in road network Identical crossing v road number, pi,jRepresent to be in the probability that the user of road j in road network moves to road i, pi,j= Ni,j/Nj, Ni,jRepresent the number of users moved from road j to road i, NjRepresent the number of users on road j;
3rd step, according to substantial amounts of historical data in anonymous server is stored in, by estimating that user velocity changes equal Value and variance, fitting user velocity change;The sample of fitting user velocity change at least chooses 10000;Velocity variations refer to Difference of the user in adjacent moment speed;
The successful probability of prediction user anonymity of step 4 specifically includes:
The first step, anonymous server judge whether initial anonymous section meets the privacy requirements of user, if satisfied, performing the Ten steps, otherwise, perform second step;Anonymous server judges whether initial anonymous section meets that the process of privacy of user demand is: The request that anonymous server receives according to current time, all user's numbers that request is sent in initial anonymous section are calculated, If the number of all request users is more than the privacy requirements of user, initial anonymous section meets the privacy requirements of user, otherwise, Initial anonymous section is unsatisfactory for the privacy requirements of user;
Second step, initially anonymous section, the situation expansion being connected by road in road network it will turn into a new section, Twice of the section that the difference in the new section and initial anonymous section is equal to maximum speed value is all expanded, and expands into new section Method:Using the both ends crossing in initial anonymous section as starting point, respectively with the distance of maximum speed value size to directly phase Road even is expanded, and all sections for meeting above-mentioned condition are all expanded, maximal rate of user etc. in road network Speed limit in road network on road, under the constraint of traffic rules, the velocity amplitude of user is no more than the higher limit;
3rd step, anonymous server searches current time without request from substantial amounts of historical data, but ask the visitor in for previous moment Ask, and the user in new section, user is formed into alternative user collection, because the user of alternative user concentration is at current time Without request, anonymous server can not judge the position at these user's current times, but alternative user is located at initially at current time On anonymous section;
4th step, anonymous server read the transfer square at crossing in initial anonymous section both ends crossing and rear expansion road Battle array, calculates specific probable value;Probability is equal to the probability that alternative user selects a paths;
5th step, anonymous server calculate alternative user previous moment according to the coordinate record of alternative user historical juncture Speed;According to coordinate record, anonymous server calculates the distance of user movement, is just used with distance divided by corresponding time The speed at family;
6th step, anonymous server calculate each alternative user and enter and stay according to normpdf Probability on initial anonymous section;The user velocity that the average and variance of probability density function are respectively equal to obtain by fitting becomes The average and variance of change, to each alternative user, the path stayed according to alternative user on initial anonymous section and alternative use The speed of family last moment obtains a speed variation, and a speed variation is all corresponded to per paths, represents alternative User on the premise of the paths are selected, current alternative user velocity variations that and if only if within the range, alternative user energy Into initial anonymous section;
7th step, anonymous server calculate current time initially in anonymous section, at least general containing k-m alternative user Rate, if probable value is more than 0.9, the 9th step is performed, otherwise, perform the 8th step, wherein, k represents privacy of user demand, and m is represented The number of user is asked in initial anonymous section;
8th step, anonymous server according to initial position of the anonymous section in road network, random selection one with just Begin the initial anonymous section of road addition that anonymous section directly connects, to form new anonymous section, anonymous server will initially be hidden Name section is updated to this new anonymous section, performs the first step;
Initial anonymous section is divided into two cross-talk sections by the 9th step, anonymous server, and sub- road is as new where taking family Anonymous section, and judge whether new anonymous section meets the needs of user, if satisfied, then repeating the 9th step until discontented Foot;If not satisfied, then perform the tenth step;If initial anonymous section does not meet privacy of user demand, but new after expanding Anonymous section meets the privacy requirement of user, then the section newly added is divided into two sections, chooses adjacent with a upper section One section of road, form new anonymous section;Anonymous server checks whether this section meets the privacy requirements of user, if full Foot, then continue executing with initial anonymous section and do not meet step in privacy of user demand;If be unsatisfactory for, the tenth is performed Step;
Tenth step, anonymous server is using the original initial anonymous section anonymous section final as user;
User's request R is converted to new request R'=(u', c, r) by the 11st step, anonymous server, and wherein R' represents to hide User's request after name server process, u' and c represent false identity and anonymous section of the anonymous server for user's generation respectively, R represents the request content of user.
Further, the formula of CA calculating Hash matrix Hs is in step 1):
BSj in step 3) for each R time it is tagged after re-encrypted, each R times label and it is corresponding at random Number information forms encryption information, specifically includes following steps:BSj selection labels tagj1 is tagged to random number, encryption information For
After the hash value of random number in step 4) matches with H hash value, the user of corresponding label is by verifying, specifically Comprise the following steps:Judge random number hash value and H hash value whether the match is successful, if so, DB is sent to BSj can use letter The encryption information of road setWherein Sj is set of available channels in the range of Cj;Otherwise DB is sent to BSj
Step 5) specifically includes following steps:BSj decrypts available channel information, and whether the match is successful by checking tagj1, if It is that a most suitable channel chj is selected in the Sj in the range of Cj, the encryption information after chj is encrypted sends to SUj, added Confidential information isOtherwise regardless of allocating channel information;
Channel use information in step 6) is EDB(BSj,ch,t);
It is further comprising the steps of after step 6):
7):Finished when cognitive user Hash sequence uses be present, or the newly increase of user, it is necessary to apply for Hash again to CA During sequence string, CA renewal Hash matrixes are simultaneously sent to DB.
A kind of Internet of Things signal transmission system based on wireless network provided in an embodiment of the present invention is provided with:
Wireless receiver, network interface, internal memory, display screen, input equipment, processor, operating system, Internet of Things Network Communication Device, storage medium, the first login authorization module, the second login authorization module, instant messaging transmission channel establish module, network Signaling transit module, equipment operating data receiving module and trigger module;
The first login authorization module, the second login authorization module, instant messaging transmission channel establish module, network letter Transit module, equipment operating data receiving module and trigger module is made to be integrated on Internet of Things communicator;
The wireless receiver is connected with network interface;The memory modules, display screen, input equipment, processor, behaviour Make system, storage medium is connected with network interface cable.
It is provided in an embodiment of the present invention it is a kind of realize described in the Internet of Things method for transmitting signals based on wireless network calculating Machine program.
A kind of computer for being equipped with the computer program provided in an embodiment of the present invention.
A kind of computer-readable recording medium provided in an embodiment of the present invention, including instruction, when it runs on computers When so that computer performs described method.
The present invention is verified using random number Hash, DB and BS is distributed channel to legal cognitive user, and And add the difficulty of attacker.
The present invention makes full use of the characteristics of network, it is proposed that the concept of any active ues and inactive users, is hidden by analysis The historical position data of name server storage, predict the distribution situation of inactive users.The present invention is due to utilizing inactive users To carry out position anonymity and original anonymous region is reduced into anonymous section, the premise of privacy of user demand can ensured The smaller anonymous region of lower generation, so as to ensure that service quality, while decreases communication overhead.
Brief description of the drawings
Fig. 1 is the Internet of Things signal transmission system structural representation provided in an embodiment of the present invention based on wireless network;
Fig. 2 is that the wireless receiver of the Internet of Things signal transmission system provided in an embodiment of the present invention based on wireless network shows It is intended to;
In figure:1st, wireless receiver;2nd, network interface;3rd, memory modules;4th, display screen;5th, input equipment;6th, handle Device;7th, operating system;8th, Internet of Things communicator;9th, storage medium;10th, first authorization module is logged in;11st, second mandate is logged in Module;12nd, instant messaging transmission channel establishes module;13rd, network signal transit module;14th, equipment operating data receiving module; 15th, trigger module.
Embodiment
In order to further understand the content, features and effects of the present invention, hereby enumerating following examples, and coordinate accompanying drawing Describe in detail as follows.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in figure 1, the Internet of Things signal transmission system based on wireless network described in the embodiment of the present invention includes:Wirelessly Receiver 1;Network interface 2;Memory modules 3;Display screen 4;Input equipment 5;Processor 6;Operating system 7;Internet of Things Network Communication Device 8;Storage medium 9;First logs in authorization module 10;Second logs in authorization module 11;Instant messaging transmission channel establishes mould Block 12;Network signal transit module 13;Equipment operating data receiving module 14;Trigger module 15.
The first login authorization module 10, second logs in authorization module 11, instant messaging transmission channel establishes module 12, Network signal transit module 13, equipment operating data receiving module 14 and trigger module 15 are integrated in Internet of Things communicator 8 On;
The wireless receiver 1 is connected with network interface 2;The memory modules 3, display screen 4, input equipment 5, processing Device 6, operating system 7, storage medium 9 with the wired connection of network interface 1.
Internet of Things method for transmitting signals provided in an embodiment of the present invention based on wireless network, including:
First stepped on by what wireless network received carrying from the first user terminal the first instant communication users identify Record request, and complete the login Authorized operation to first user terminal;Carrying from network access equipment is received to set Second logging request of standby mark, and complete the login Authorized operation to the network access equipment;
Instant messaging is established according to first instant communication users mark of the first association and the device identification Transmission channel;By the instant messaging transmission channel to being transmitted between first user terminal and the network access equipment Network signal carry out transfer;
Receive the facility information for the network access equipment that first user terminal is obtained and sent;
Identified according to the facility information distributing equipment, and establish the first instant communication users mark and the equipment First association of mark;
The device identification is passed to by the network access equipment by first user terminal;
When first user terminal is got and the of first instant communication users mark with social networks chain After two instant communication users mark, receive and carry the device identification and described second transmitted by first user terminal The collaborative share request of instant communication users mark;
Asked to identify the second user terminal logged in hair to second instant communication users according to the collaborative share The collaborative share is sent to ask;
Receive the second user terminal and the shared feedback of returned accepting device is asked according to the collaborative share Afterwards, establish the device identification and second instant communication users identify second associates;
Receive the equipment operating data for the corresponding device attribute that the network access equipment periodically reports;
Detect that the equipment operating data meets to trigger predetermined registration operation during preset trigger condition;
Receive the association for carrying device identification that first user terminal is sent and release request;
Request is released according to the association and releases first association and/or second association.
The wireless network connects the login Authorized operation to the network access equipment, including:1) authentication center CA is generated Random number sequence matrix R, R={ Rmn }, (1≤m≤N), (1≤n≤N);CA calculates hash Hash matrix Hs according to R and sends out H Deliver to database D B;M × n random number is randomly assigned to M cognitive user by R by CA with behavior unit, and cognitive user SUj is obtained The random number sequence set note Rj (1≤j≤M) obtained, goes to step 2);
2):Base station BS js of the SUj by control channel into the region Cj where it, send the channel request information of encryption EBSj (Rj1, t), t are the time, go to step 3);
3):BSj collects all EBSj that t receives and decrypts the sequence string received, obtains a series of secondary user Information R times;BSj is each R times tagged rear re-encrypted, and each R times label and corresponding random number information are formed Encryption information;BSj sends each R times encryption information to DB, goes to step 4);
4):After random number in encryption information is decrypted DB, the hash value that random number is calculated in Hash is carried out, with After the hash value of machine number matches with H hash value, the user of corresponding label passes through checking;DB is by the label and Cj by checking Usable spectrum information encrypt and to form available channel information after, send to BSj, DB and delete the hash value matched in H, go to step It is rapid 5);
5):BSj is to distribute channel by the cognitive user of checking according to available channel information, goes to step S6;
6):BSj registration channel use informations in DB;
First logging request of first user terminal, including:
Step 1, user send location Based service to anonymous server and asked, identity of the service request including user, The geographical coordinate of user, at the time of send request, the privacy requirements of the content of request and user;Privacy requirements refer to user couple The requirement of user's number in the anonymous section of anonymous server generation;
Step 2, anonymous server initialization;
Step 3, generate initial anonymous region;Anonymous server receives user's request, generates initial anonymous region, statistics Current time initially in anonymous section all request users numbers;
Step 4, predict the successful probability of user anonymity;
Step 5, returns to Query Result, and the user after processing is asked R', is sent to offer location-based service by anonymous server Server;Anonymous server obtains Query Result set from the server for providing location-based service;Anonymous server is according to user Actual position the Query Result of most suitable user is picked out from Query Result set, and return result to request service User.
Further, the Internet of Things method for transmitting signals based on wireless network also includes:
Identified according to the first instant communication users and log in Internet of Things service platform;
By the Internet of Things service platform obtain with first instant communication users mark have first associate set Standby mark;
Network insertion according to the device identification with logging in the Internet of Things service platform with the device identification is set It is standby to establish the instant messaging transmission channel that transfer is carried out by the Internet of Things service platform;
The transmission of network signal is carried out by the instant messaging transmission channel and the network access equipment;
Obtain the facility information of network access equipment;
The facility information is sent to the Internet of Things service platform, the Internet of Things service platform is set according to Standby information distributing equipment identifies, and establishes the first instant communication users mark and associated with the first of the device identification;
Receive the device identification that the Internet of Things service platform is fed back and be sent to the network access equipment, it is described to set It is standby to identify for making the network access equipment log in the Internet of Things service platform according to the device identification;
Obtain and identified with second instant communication users of first instant communication users mark with social networks chain;It is logical The Internet of Things service platform is crossed to the user that the Internet of Things service platform is logged in second instant communication users mark Terminal sends the collaborative share request for carrying the device identification, the Internet of Things service platform is being received the user After the shared feedback of accepting device that terminal returns, the of the device identification and second instant communication users mark is established Two associations;
The Internet of Things service platform is received in the corresponding device category for detecting that the network access equipment periodically reports The equipment operating data of property meets presetting message transmitted during preset trigger condition;
The association releasing request for carrying device identification is sent to the Internet of Things service platform, makes the Internet of Things service Platform releases request according to the association and releases first association and/or second association.
Step 2 specifically includes:
The first step, anonymous server generate a file, store the coordinate of the central point of every road in road network, in Heart coordinate is a two-dimensional coordinate, the as transverse and longitudinal coordinate of central point, every road herein be defined as on this section except Outside the crossing at both ends, the stretch without other crossings;
Second step, calculate crossing probability transfer matrix;Probability transfer matrix is as follows:
Wherein, M (v) represents the probability transfer matrix of crossing v in road network, and subscript 1 to n represents to contain in road network Identical crossing v road number, pi,jRepresent to be in the probability that the user of road j in road network moves to road i, pi,j= Ni,j/Nj, Ni,jRepresent the number of users moved from road j to road i, NjRepresent the number of users on road j;
3rd step, according to substantial amounts of historical data in anonymous server is stored in, by estimating that user velocity changes equal Value and variance, fitting user velocity change;The sample of fitting user velocity change at least chooses 10000;Velocity variations refer to Difference of the user in adjacent moment speed;
The successful probability of prediction user anonymity of step 4 specifically includes:
The first step, anonymous server judge whether initial anonymous section meets the privacy requirements of user, if satisfied, performing the Ten steps, otherwise, perform second step;Anonymous server judges whether initial anonymous section meets that the process of privacy of user demand is: The request that anonymous server receives according to current time, all user's numbers that request is sent in initial anonymous section are calculated, If the number of all request users is more than the privacy requirements of user, initial anonymous section meets the privacy requirements of user, otherwise, Initial anonymous section is unsatisfactory for the privacy requirements of user;
Second step, initially anonymous section, the situation expansion being connected by road in road network it will turn into a new section, Twice of the section that the difference in the new section and initial anonymous section is equal to maximum speed value is all expanded, and expands into new section Method:Using the both ends crossing in initial anonymous section as starting point, respectively with the distance of maximum speed value size to directly phase Road even is expanded, and all sections for meeting above-mentioned condition are all expanded, maximal rate of user etc. in road network Speed limit in road network on road, under the constraint of traffic rules, the velocity amplitude of user is no more than the higher limit;
3rd step, anonymous server searches current time without request from substantial amounts of historical data, but ask the visitor in for previous moment Ask, and the user in new section, user is formed into alternative user collection, because the user of alternative user concentration is at current time Without request, anonymous server can not judge the position at these user's current times, but alternative user is located at initially at current time On anonymous section;
4th step, anonymous server read the transfer square at crossing in initial anonymous section both ends crossing and rear expansion road Battle array, calculates specific probable value;Probability is equal to the probability that alternative user selects a paths;
5th step, anonymous server calculate alternative user previous moment according to the coordinate record of alternative user historical juncture Speed;According to coordinate record, anonymous server calculates the distance of user movement, is just used with distance divided by corresponding time The speed at family;
6th step, anonymous server calculate each alternative user and enter and stay according to normpdf Probability on initial anonymous section;The user velocity that the average and variance of probability density function are respectively equal to obtain by fitting becomes The average and variance of change, to each alternative user, the path stayed according to alternative user on initial anonymous section and alternative use The speed of family last moment obtains a speed variation, and a speed variation is all corresponded to per paths, represents alternative User on the premise of the paths are selected, current alternative user velocity variations that and if only if within the range, alternative user energy Into initial anonymous section;
7th step, anonymous server calculate current time initially in anonymous section, at least general containing k-m alternative user Rate, if probable value is more than 0.9, the 9th step is performed, otherwise, perform the 8th step, wherein, k represents privacy of user demand, and m is represented The number of user is asked in initial anonymous section;
8th step, anonymous server according to initial position of the anonymous section in road network, random selection one with just Begin the initial anonymous section of road addition that anonymous section directly connects, to form new anonymous section, anonymous server will initially be hidden Name section is updated to this new anonymous section, performs the first step;
Initial anonymous section is divided into two cross-talk sections by the 9th step, anonymous server, and sub- road is as new where taking family Anonymous section, and judge whether new anonymous section meets the needs of user, if satisfied, then repeating the 9th step until discontented Foot;If not satisfied, then perform the tenth step;If initial anonymous section does not meet privacy of user demand, but new after expanding Anonymous section meets the privacy requirement of user, then the section newly added is divided into two sections, chooses adjacent with a upper section One section of road, form new anonymous section;Anonymous server checks whether this section meets the privacy requirements of user, if full Foot, then continue executing with initial anonymous section and do not meet step in privacy of user demand;If be unsatisfactory for, the tenth is performed Step;
Tenth step, anonymous server is using the original initial anonymous section anonymous section final as user;
User's request R is converted to new request R'=(u', c, r) by the 11st step, anonymous server, and wherein R' represents to hide User's request after name server process, u' and c represent false identity and anonymous section of the anonymous server for user's generation respectively, R represents the request content of user.
The formula of CA calculating Hash matrix Hs is in step 1):
BSj in step 3) for each R time it is tagged after re-encrypted, each R times label and it is corresponding at random Number information forms encryption information, specifically includes following steps:BSj selection labels tagj1 is tagged to random number, encryption information For
After the hash value of random number in step 4) matches with H hash value, the user of corresponding label is by verifying, specifically Comprise the following steps:Judge random number hash value and H hash value whether the match is successful, if so, DB is sent to BSj can use letter The encryption information of road setWherein Sj is set of available channels in the range of Cj;Otherwise DB is sent to BSj
Step 5) specifically includes following steps:BSj decrypts available channel information, and whether the match is successful by checking tagj1, if It is that a most suitable channel chj is selected in the Sj in the range of Cj, the encryption information after chj is encrypted sends to SUj, added Confidential information isOtherwise regardless of allocating channel information;
Channel use information in step 6) is EDB(BSj,ch,t);
It is further comprising the steps of after step 6):
7):Finished when cognitive user Hash sequence uses be present, or the newly increase of user, it is necessary to apply for Hash again to CA During sequence string, CA renewal Hash matrixes are simultaneously sent to DB.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real It is existing.When using whole or in part realizing in the form of a computer program product, the computer program product include one or Multiple computer instructions.When loading on computers or performing the computer program instructions, produce whole or in part according to Flow or function described in the embodiment of the present invention.The computer can be all-purpose computer, special-purpose computer, computer network Network or other programmable devices.The computer instruction can store in a computer-readable storage medium, or from one Computer-readable recording medium transmits to another computer-readable recording medium, for example, the computer instruction can be from one Individual web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL) Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center Transmission).The computer read/write memory medium can be that any usable medium that computer can access either includes one The data storage devices such as the integrated server of individual or multiple usable mediums, data center.The usable medium can be that magnetic is situated between Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disc Solid State Disk (SSD)) etc..
It is described above to be only the preferred embodiments of the present invention, any formal limitation not is made to the present invention, Every technical spirit according to the present invention belongs to any simple modification made for any of the above embodiments, equivalent variations and modification In the range of technical solution of the present invention.

Claims (8)

  1. A kind of 1. Internet of Things method for transmitting signals based on wireless network, it is characterised in that the Internet of Things based on wireless network Net method for transmitting signals includes:
    Receiving the first login for carrying the first instant communication users mark from the first user terminal by wireless network please Ask, and complete the login Authorized operation to first user terminal;Receive and carry equipment mark from network access equipment The second logging request known, and complete the login Authorized operation to the network access equipment;
    Instant messaging transmission is established according to first instant communication users mark of the first association and the device identification Passage;By the instant messaging transmission channel to the net that is transmitted between first user terminal and the network access equipment Network signaling carries out transfer;
    Receive the facility information for the network access equipment that first user terminal is obtained and sent;
    Identified according to the facility information distributing equipment, and establish the first instant communication users mark and the device identification First association;
    The device identification is passed to by the network access equipment by first user terminal;
    When first user terminal is got with second of first instant communication users mark with social networks chain i.e. When communication user mark after, receive and carry the device identification and described second instant transmitted by first user terminal The collaborative share request of communication user mark;
    Asked to identify the second user terminal logged in transmission institute to second instant communication users according to the collaborative share State collaborative share request;
    After the second user terminal is received according to the shared feedback of the returned accepting device of collaborative share request, build Stand the device identification and second instant communication users identify second associates;
    Receive the equipment operating data for the corresponding device attribute that the network access equipment periodically reports;
    Detect that the equipment operating data meets to trigger predetermined registration operation during preset trigger condition;
    Receive the association for carrying device identification that first user terminal is sent and release request;
    Request is released according to the association and releases first association and/or second association;
    The wireless network connects the login Authorized operation to the network access equipment, including:1) authentication center CA generations are random Number sequence column matrix R, R={ Rmn }, (1≤m≤N), (1≤n≤N);CA according to R calculate hash Hash matrix Hs and by H send to Database D B;M × n random number is randomly assigned to M cognitive user by R by CA with behavior unit, what cognitive user SUj was obtained Random number sequence set note Rj (1≤j≤M), goes to step 2);
    2):Base station BS js of the SUj by control channel into the region Cj where it, send the channel request information EBSj of encryption (Rj1, t), t are the time, go to step 3);
    3):BSj collects all EBSj that t receives and decrypts the sequence string received, obtains a series of secondary user profile R times;BSj is each R times tagged rear re-encrypted, and each R times label and corresponding random number information form encryption Information;BSj sends each R times encryption information to DB, goes to step 4);
    4):After random number in encryption information is decrypted DB, the hash value that random number is calculated in Hash, random number are carried out Hash value matched with H hash value after, the user of corresponding label passes through checking;DB by the label and Cj by checking can Encrypted with spectrum information after forming available channel information, send to BSj, DB and delete the hash value matched in H, go to step 5);
    5):BSj is to distribute channel by the cognitive user of checking according to available channel information, goes to step S6;
    6):BSj registration channel use informations in DB;
    7):Finished when cognitive user Hash sequence uses be present, or the newly increase of user, it is necessary to apply for Hash sequences to CA again During string, CA renewal Hash matrixes are simultaneously sent to DB;
    First logging request of first user terminal, including:
    Step 1, user send location Based service request to anonymous server, and service request includes the identity of user, user Geographical coordinate, send request at the time of, request content and user privacy requirements;Privacy requirements refer to user to anonymity The requirement of user's number in the anonymous section of server generation;
    Step 2, anonymous server initialization;
    Step 3, generate initial anonymous region;Anonymous server receives user's request, generates initial anonymous region, and statistics is current Moment initially in anonymous section all request users numbers;
    Step 4, predict the successful probability of user anonymity;
    Step 5, Query Result is returned to, the user after processing is asked R' by anonymous server, is sent to the clothes for providing location-based service Business device;Anonymous server obtains Query Result set from the server for providing location-based service;Anonymous server is according to the true of user The Query Result of most suitable user is picked out in real position from Query Result set, and returns result to the use of request service Family.
  2. 2. the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1, it is characterised in that it is described based on The Internet of Things method for transmitting signals of wireless network also includes:
    Identified according to the first instant communication users and log in Internet of Things service platform;
    Obtained by the Internet of Things service platform has the first equipment mark associated with first instant communication users mark Know;
    Built according to the device identification with logging in the network access equipment of the Internet of Things service platform with the device identification The vertical instant messaging transmission channel that transfer is carried out by the Internet of Things service platform;
    The transmission of network signal is carried out by the instant messaging transmission channel and the network access equipment;
    Obtain the facility information of network access equipment;
    The facility information is sent to the Internet of Things service platform, the Internet of Things service platform is believed according to the equipment Distributing equipment mark is ceased, and establishes the first instant communication users mark and is associated with the first of the device identification;
    Receive the device identification that the Internet of Things service platform is fed back and be sent to the network access equipment, the equipment mark Know for making the network access equipment log in the Internet of Things service platform according to the device identification;
    Obtain and identified with second instant communication users of first instant communication users mark with social networks chain;Pass through institute Internet of Things service platform is stated to the user terminal that the Internet of Things service platform is logged in second instant communication users mark The collaborative share request for carrying the device identification is sent, the Internet of Things service platform is being received the user terminal After the shared feedback of the accepting device of return, the second pass of the device identification and second instant communication users mark is established Connection;
    Receive the Internet of Things service platform and detect corresponding device attribute that the network access equipment periodically reports Equipment operating data meets presetting message transmitted during preset trigger condition;
    The association releasing request for carrying device identification is sent to the Internet of Things service platform, makes the Internet of Things service platform Request is released according to the association and releases first association and/or second association.
  3. 3. the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1, it is characterised in that
    Step 2 specifically includes:
    The first step, anonymous server generate a file, store the coordinate of the central point of every road in road network, and center is sat Mark is a two-dimensional coordinate, the as transverse and longitudinal coordinate of central point, and every road herein is defined as on this section except both ends Crossing outside, the stretch without other crossings;
    Second step, calculate crossing probability transfer matrix;Probability transfer matrix is as follows:
    Wherein, M (v) represents the probability transfer matrix of crossing v in road network, and subscript 1 to n is represented in road network containing identical Crossing v road number, pi,jRepresent to be in the probability that the user of road j in road network moves to road i, pi,j=Ni,j/ Nj, Ni,jRepresent the number of users moved from road j to road i, NjRepresent the number of users on road j;
    3rd step, according to being stored in substantial amounts of historical data in anonymous server, by estimate average that user velocity changes and Variance, fitting user velocity change;The sample of fitting user velocity change at least chooses 10000;Velocity variations refer to user In the difference of adjacent moment speed;
    The successful probability of prediction user anonymity of step 4 specifically includes:
    The first step, anonymous server judge whether initial anonymous section meets the privacy requirements of user, if satisfied, performing the tenth Step, otherwise, perform second step;Anonymous server judges whether initial anonymous section meets that the process of privacy of user demand is:Hide The request that name server receives according to current time, all user's numbers that request is sent in initial anonymous section are calculated, if The number of all request users is more than the privacy requirements of user, then initial anonymous section meets the privacy requirements of user, otherwise, just Anonymous section of beginning is unsatisfactory for the privacy requirements of user;
    Second step, initially anonymous section, the situation expansion being connected by road in road network it will turn into a new section, this is new Twice of the section that the difference in section and initial anonymous section is equal to maximum speed value is all expanded, and expands into the side in new section Method:Using the both ends crossing in initial anonymous section as starting point, respectively with the distance of maximum speed value size to directly connected Road is expanded, and all sections for meeting above-mentioned condition are all expanded, and the maximal rate of user is equal to road in road network Speed limit in road network on road, under the constraint of traffic rules, the velocity amplitude of user is no more than the higher limit;
    3rd step, anonymous server searches current time without request from substantial amounts of historical data, but previous moment has request, and User in new section, by user form alternative user collection, due to alternative user concentrate user current time without please Ask, anonymous server can not judge the position at these user's current times, but alternative user is located at initial anonymity at current time On section;
    4th step, anonymous server read the transfer matrix at crossing in initial anonymous section both ends crossing and rear expansion road, calculated Go out specific probable value;Probability is equal to the probability that alternative user selects a paths;
    5th step, anonymous server is according to the coordinate record of alternative user historical juncture, the speed of calculating alternative user previous moment Degree;According to coordinate record, anonymous server calculates the distance of user movement, just obtains user's with distance divided by corresponding time Speed;
    6th step, anonymous server calculate each alternative user and enter and stay in initial according to normpdf Probability on anonymous section;What the user velocity that the average and variance of probability density function are respectively equal to obtain by fitting changed Average and variance, to each alternative user, stayed according to alternative user on path and alternative user on initial anonymous section The speed at one moment obtains a speed variation, and a speed variation is all corresponded to per paths, represents alternative user On the premise of the paths are selected, within the range, alternative user can enter current alternative user velocity variations that and if only if Initial anonymous section;
    7th step, anonymous server calculate current time initially in anonymous section, at least the probability containing k-m alternative user, If probable value is more than 0.9, the 9th step is performed, otherwise, performs the 8th step, wherein, k represents privacy of user demand, and m represents initial The number of user is asked in anonymous section;
    8th step, anonymous server is according to initial position of the anonymous section in road network, and random selection one is with initially hideing The road that name section directly connects adds initial anonymous section, forms new anonymous section, and anonymous server will initial anonymous road Section is updated to this new anonymous section, performs the first step;
    Initial anonymous section is divided into two cross-talk sections by the 9th step, anonymous server, and sub- road where taking family is hidden as new Name section, and judge whether new anonymous section meets the needs of user, if satisfied, then repeating the 9th step until being unsatisfactory for; If not satisfied, then perform the tenth step;If initial anonymous section does not meet privacy of user demand, but the new anonymity after expanding Section meets the privacy requirement of user, then the section newly added is divided into two sections, chooses one section adjacent with a upper section Road, form new anonymous section;Anonymous server checks whether this section meets the privacy requirements of user, if it is satisfied, then Continue executing with initial anonymous section and do not meet step in privacy of user demand;If be unsatisfactory for, the tenth step is performed;
    Tenth step, anonymous server is using the original initial anonymous section anonymous section final as user;
    User's request R is converted to new request R'=(u', c, r) by the 11st step, anonymous server, and wherein R' represents anonymous clothes User's request after business device processing, u' and c represent false identity and anonymous section of the anonymous server for user's generation, r tables respectively Show the request content of user.
  4. 4. the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1, it is characterised in that
    The formula of CA calculating Hash matrix Hs is in step 1):
    BSj in step 3) is each R times tagged rear re-encrypted, each R times label and corresponding random number letter Breath forms encryption information, specifically includes following steps:BSj selection labels tagj1 is tagged to random number, and encryption information is
    After the hash value of random number in step 4) matches with H hash value, the user of corresponding label is specifically included by checking Following steps:Judge random number hash value and H hash value whether the match is successful, if so, DB sends set of available channels to BSj Encryption informationWherein Sj is set of available channels in the range of Cj;Otherwise DB is sent to BSj
    Step 5) specifically includes following steps:BSj decrypts available channel information, and whether the match is successful by checking tagj1, if so, A most suitable channel chj is selected in Sj in the range of Cj, after chj is encrypted
    Encryption information is sent to SUj, encryption informationOtherwise regardless of allocating channel information;
    Channel use information in step 6) is EDB(BSj,ch,t)。
  5. A kind of 5. Internet of Things based on wireless network of the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1 Net signal transmission system, it is characterised in that the Internet of Things signal transmission system based on wireless network is provided with:
    Wireless receiver, network interface, internal memory, display screen, input equipment, processor, operating system, Internet of Things Network Communication dress Put, storage medium, the first login authorization module, the second login authorization module, instant messaging transmission channel establish module, network letter Make transit module, equipment operating data receiving module and trigger module;
    The first login authorization module, the second login authorization module, instant messaging transmission channel are established in module, network signal Revolving die block, equipment operating data receiving module and trigger module are integrated on Internet of Things communicator;
    The wireless receiver is connected with network interface;The memory modules, display screen, input equipment, processor, operation system System, storage medium are connected with network interface cable.
  6. A kind of 6. calculating for realizing the Internet of Things method for transmitting signals based on wireless network described in Claims 1 to 4 any one Machine program.
  7. A kind of 7. computer for being equipped with computer program described in claim 6.
  8. 8. a kind of computer-readable recording medium, including instruction, when run on a computer so that computer is performed as weighed Profit requires the method described in 1-4 any one.
CN201711373249.7A 2017-12-19 2017-12-19 A kind of Internet of Things method for transmitting signals and system based on wireless network Pending CN107846660A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711373249.7A CN107846660A (en) 2017-12-19 2017-12-19 A kind of Internet of Things method for transmitting signals and system based on wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711373249.7A CN107846660A (en) 2017-12-19 2017-12-19 A kind of Internet of Things method for transmitting signals and system based on wireless network

Publications (1)

Publication Number Publication Date
CN107846660A true CN107846660A (en) 2018-03-27

Family

ID=61663428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711373249.7A Pending CN107846660A (en) 2017-12-19 2017-12-19 A kind of Internet of Things method for transmitting signals and system based on wireless network

Country Status (1)

Country Link
CN (1) CN107846660A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359088A (en) * 2018-10-17 2019-02-19 武汉市快讯通信息技术有限公司 A kind of increased value service system and value-added service method based on mobile radio communication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110176508A1 (en) * 2008-12-08 2011-07-21 Onur Altintas Frequency Band Coordination Method and Radio Communication Apparatus in Cognitive Radio System
CN104540130A (en) * 2015-01-06 2015-04-22 西安电子科技大学 Self coexistence channel selection method based on Hash matching in cognitive radio network
CN104780173A (en) * 2015-04-16 2015-07-15 西安电子科技大学 System and method for selecting anonymous road section under location privacy protection in road network
CN105553921A (en) * 2014-10-31 2016-05-04 腾讯科技(上海)有限公司 Internet of things communication method and apparatus, and internet of things communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110176508A1 (en) * 2008-12-08 2011-07-21 Onur Altintas Frequency Band Coordination Method and Radio Communication Apparatus in Cognitive Radio System
CN105553921A (en) * 2014-10-31 2016-05-04 腾讯科技(上海)有限公司 Internet of things communication method and apparatus, and internet of things communication system
CN104540130A (en) * 2015-01-06 2015-04-22 西安电子科技大学 Self coexistence channel selection method based on Hash matching in cognitive radio network
CN104780173A (en) * 2015-04-16 2015-07-15 西安电子科技大学 System and method for selecting anonymous road section under location privacy protection in road network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359088A (en) * 2018-10-17 2019-02-19 武汉市快讯通信息技术有限公司 A kind of increased value service system and value-added service method based on mobile radio communication

Similar Documents

Publication Publication Date Title
Liao et al. Location and trajectory privacy preservation in 5G-Enabled vehicle social network services
Wan et al. Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing
Jiau et al. Multimedia services in cloud-based vehicular networks
CN106162804B (en) For the method and apparatus for the access information for providing wireless access focus
US9465950B2 (en) Methods, apparatuses, and computer-readable storage media for securely accessing social networking data
CN105554704B (en) Location privacy protection method based on false track in recommender system
Sun et al. Towards privacy preservation for “check-in” services in location-based social networks
CN103188270A (en) Method, device and system for accessing recommended server to IP address
CN104936141B (en) LBS method for protecting track privacy based on location tags
CN110351806A (en) A kind of transmission method and system of block chain electronic health care medical record information
CN110505627A (en) A kind of authentication method and device based on access node group
CN104012130B (en) Communication security processing method and processing device
CN105430615A (en) Location privacy protection method based on false locations under continuous location service requests
CN101998407B (en) WLAN access authentication based method for accessing services
Li et al. Privacy-preserving participant grouping for mobile social sensing over edge clouds
CN105978790A (en) Bluetooth-based robot social contact system and apparatus
Wang et al. ClusterRep: A cluster-based reputation framework for balancing privacy and trust in vehicular participatory sensing
CN103686947A (en) Message transmission method and device based on virtual AP
He et al. Privacy and incentive mechanisms in people-centric sensing networks
CN107846660A (en) A kind of Internet of Things method for transmitting signals and system based on wireless network
CN106911659A (en) One seed account information processing system, method and device
CN107257292B (en) A kind of cross-domain distributed big data communication system design planning method
CN107005576A (en) The bridge joint matching identification symbol for link identifiers is generated from server log
Liu et al. Bilateral privacy-utility tradeoff in spectrum sharing systems: A game-theoretic approach
Carbunar et al. Private badges for geosocial networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180327

RJ01 Rejection of invention patent application after publication