CN107846660A - A kind of Internet of Things method for transmitting signals and system based on wireless network - Google Patents
A kind of Internet of Things method for transmitting signals and system based on wireless network Download PDFInfo
- Publication number
- CN107846660A CN107846660A CN201711373249.7A CN201711373249A CN107846660A CN 107846660 A CN107846660 A CN 107846660A CN 201711373249 A CN201711373249 A CN 201711373249A CN 107846660 A CN107846660 A CN 107846660A
- Authority
- CN
- China
- Prior art keywords
- user
- anonymous
- section
- internet
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
Abstract
The invention belongs to the Internet of Things communications field, disclose a kind of Internet of Things method for transmitting signals and system based on wireless network, the first logging request for carrying the first instant communication users and identifying from the first user terminal is received by wireless network, and completes the login Authorized operation to first user terminal;The second logging request for carrying device identification from network access equipment is received, and completes the login Authorized operation to the network access equipment;Instant messaging transmission channel is established according to first instant communication users mark of the first association and device identification;Transfer etc. is carried out to the network signal transmitted between the first user terminal and the network access equipment by instant messaging transmission channel.Internet of Things communication means provided by the invention based on wireless network, establishes Internet of Things on the basis of the instant communication resource, at utmost make use of existing superior resource, greatly reduces the cost of exploitation and application Internet of Things.
Description
Technical field
The invention belongs to the Internet of Things communications field, more particularly to a kind of Internet of Things method for transmitting signals based on wireless network
And system.
Background technology
At present, Internet of Things is the important component of generation information technology, and its English name is " TheInternetof
Things ", refer to the connected internet of thing thing.The core of Internet of Things and basis are still internet, are on Internet basic
Extension and extension network, Internet of Things causes internet based on user terminal to extend and extend between article and article
Information exchanges and communication.There are some to study and apply in terms of Internet of Things at present, passed through and biography is implanted into some objects
Sensor is connected with central server to realize Internet of Things, such central server can and the various objects for implanting sensor
Interconnect.
However, the Internet of Things scheme for the object for implanting sensor is managed, it is necessary to center by central server at present
Server admin, cost are too high, it is difficult to are applied to civil area.
The method for avoiding cognitive radio networks under attack is generally:Utilized in the cognitive radio networks of DB drivings
The blind factor hides the positional information of user, while proposes that a kind of frequency spectrum based on prediction uses agreement, by selecting state more steady
Fixed channel switches to reduce, so as to reduce the probability that attacker successfully infers cognitive user positional information.
But the above method needs to judge the stabilization of channel according to the frequency of use of each cognitive user storage available channel
Property after, using channel degree of stability carry out Channel assignment, operation it is more complicated, be not easy to people use.
In summary, the problem of prior art is present be:Need central server management, cost is too high, it is difficult to is applied to
Civil area, the needs of user can not be met.
The content of the invention
The problem of existing for prior art, the invention provides a kind of Internet of Things signal transmission side based on wireless network
Method and system.
The present invention is achieved in that a kind of Internet of Things method for transmitting signals based on wireless network, including:
First stepped on by what wireless network received carrying from the first user terminal the first instant communication users identify
Record request, and complete the login Authorized operation to first user terminal;Carrying from network access equipment is received to set
Second logging request of standby mark, and complete the login Authorized operation to the network access equipment;
Instant messaging is established according to first instant communication users mark of the first association and the device identification
Transmission channel;By the instant messaging transmission channel to being transmitted between first user terminal and the network access equipment
Network signal carry out transfer;
Receive the facility information for the network access equipment that first user terminal is obtained and sent;
Identified according to the facility information distributing equipment, and establish the first instant communication users mark and the equipment
First association of mark;
The device identification is passed to by the network access equipment by first user terminal;
When first user terminal is got and the of first instant communication users mark with social networks chain
After two instant communication users mark, receive and carry the device identification and described second transmitted by first user terminal
The collaborative share request of instant communication users mark;
Asked to identify the second user terminal logged in hair to second instant communication users according to the collaborative share
The collaborative share is sent to ask;
Receive the second user terminal and the shared feedback of returned accepting device is asked according to the collaborative share
Afterwards, establish the device identification and second instant communication users identify second associates;
Receive the equipment operating data for the corresponding device attribute that the network access equipment periodically reports;
Detect that the equipment operating data meets to trigger predetermined registration operation during preset trigger condition;
Receive the association for carrying device identification that first user terminal is sent and release request;
Request is released according to the association and releases first association and/or second association;
The wireless network connects the login Authorized operation to the network access equipment, including:1) authentication center CA is generated
Random number sequence matrix R, R={ Rmn }, (1≤m≤N), (1≤n≤N);CA calculates hash Hash matrix Hs according to R and sends out H
Deliver to database D B;M × n random number is randomly assigned to M cognitive user by R by CA with behavior unit, and cognitive user SUj is obtained
The random number sequence set note Rj (1≤j≤M) obtained, goes to step 2);
2):Base station BS js of the SUj by control channel into the region Cj where it, send the channel request information of encryption
EBSj (Rj1, t), t are the time, go to step 3);
3):BSj collects all EBSj that t receives and decrypts the sequence string received, obtains a series of secondary user
Information R times;BSj is each R times tagged rear re-encrypted, and each R times label and corresponding random number information are formed
Encryption information;BSj sends each R times encryption information to DB, goes to step 4);
4):After random number in encryption information is decrypted DB, the hash value that random number is calculated in Hash is carried out, with
After the hash value of machine number matches with H hash value, the user of corresponding label passes through checking;DB is by the label and Cj by checking
Usable spectrum information encrypt and to form available channel information after, send to BSj, DB and delete the hash value matched in H, go to step
It is rapid 5);
5):BSj is to distribute channel by the cognitive user of checking according to available channel information, goes to step S6;
6):BSj registration channel use informations in DB;
First logging request of first user terminal, including:
Step 1, user send location Based service to anonymous server and asked, identity of the service request including user,
The geographical coordinate of user, at the time of send request, the privacy requirements of the content of request and user;Privacy requirements refer to user couple
The requirement of user's number in the anonymous section of anonymous server generation;
Step 2, anonymous server initialization;
Step 3, generate initial anonymous region;Anonymous server receives user's request, generates initial anonymous region, statistics
Current time initially in anonymous section all request users numbers;
Step 4, predict the successful probability of user anonymity;
Step 5, returns to Query Result, and the user after processing is asked R', is sent to offer location-based service by anonymous server
Server;Anonymous server obtains Query Result set from the server for providing location-based service;Anonymous server is according to user
Actual position the Query Result of most suitable user is picked out from Query Result set, and return result to request service
User.
Further, the Internet of Things method for transmitting signals based on wireless network also includes:
Identified according to the first instant communication users and log in Internet of Things service platform;
By the Internet of Things service platform obtain with first instant communication users mark have first associate set
Standby mark;
Network insertion according to the device identification with logging in the Internet of Things service platform with the device identification is set
It is standby to establish the instant messaging transmission channel that transfer is carried out by the Internet of Things service platform;
The transmission of network signal is carried out by the instant messaging transmission channel and the network access equipment;
Obtain the facility information of network access equipment;
The facility information is sent to the Internet of Things service platform, the Internet of Things service platform is set according to
Standby information distributing equipment identifies, and establishes the first instant communication users mark and associated with the first of the device identification;
Receive the device identification that the Internet of Things service platform is fed back and be sent to the network access equipment, it is described to set
It is standby to identify for making the network access equipment log in the Internet of Things service platform according to the device identification;
Obtain and identified with second instant communication users of first instant communication users mark with social networks chain;It is logical
The Internet of Things service platform is crossed to the user that the Internet of Things service platform is logged in second instant communication users mark
Terminal sends the collaborative share request for carrying the device identification, the Internet of Things service platform is being received the user
After the shared feedback of accepting device that terminal returns, the of the device identification and second instant communication users mark is established
Two associations;
The Internet of Things service platform is received in the corresponding device category for detecting that the network access equipment periodically reports
The equipment operating data of property meets presetting message transmitted during preset trigger condition;
The association releasing request for carrying device identification is sent to the Internet of Things service platform, makes the Internet of Things service
Platform releases request according to the association and releases first association and/or second association;
Further, step 2 specifically includes:
The first step, anonymous server generate a file, store the coordinate of the central point of every road in road network, in
Heart coordinate is a two-dimensional coordinate, the as transverse and longitudinal coordinate of central point, every road herein be defined as on this section except
Outside the crossing at both ends, the stretch without other crossings;
Second step, calculate crossing probability transfer matrix;Probability transfer matrix is as follows:
Wherein, M (v) represents the probability transfer matrix of crossing v in road network, and subscript 1 to n represents to contain in road network
Identical crossing v road number, pi,jRepresent to be in the probability that the user of road j in road network moves to road i, pi,j=
Ni,j/Nj, Ni,jRepresent the number of users moved from road j to road i, NjRepresent the number of users on road j;
3rd step, according to substantial amounts of historical data in anonymous server is stored in, by estimating that user velocity changes equal
Value and variance, fitting user velocity change;The sample of fitting user velocity change at least chooses 10000;Velocity variations refer to
Difference of the user in adjacent moment speed;
The successful probability of prediction user anonymity of step 4 specifically includes:
The first step, anonymous server judge whether initial anonymous section meets the privacy requirements of user, if satisfied, performing the
Ten steps, otherwise, perform second step;Anonymous server judges whether initial anonymous section meets that the process of privacy of user demand is:
The request that anonymous server receives according to current time, all user's numbers that request is sent in initial anonymous section are calculated,
If the number of all request users is more than the privacy requirements of user, initial anonymous section meets the privacy requirements of user, otherwise,
Initial anonymous section is unsatisfactory for the privacy requirements of user;
Second step, initially anonymous section, the situation expansion being connected by road in road network it will turn into a new section,
Twice of the section that the difference in the new section and initial anonymous section is equal to maximum speed value is all expanded, and expands into new section
Method:Using the both ends crossing in initial anonymous section as starting point, respectively with the distance of maximum speed value size to directly phase
Road even is expanded, and all sections for meeting above-mentioned condition are all expanded, maximal rate of user etc. in road network
Speed limit in road network on road, under the constraint of traffic rules, the velocity amplitude of user is no more than the higher limit;
3rd step, anonymous server searches current time without request from substantial amounts of historical data, but ask the visitor in for previous moment
Ask, and the user in new section, user is formed into alternative user collection, because the user of alternative user concentration is at current time
Without request, anonymous server can not judge the position at these user's current times, but alternative user is located at initially at current time
On anonymous section;
4th step, anonymous server read the transfer square at crossing in initial anonymous section both ends crossing and rear expansion road
Battle array, calculates specific probable value;Probability is equal to the probability that alternative user selects a paths;
5th step, anonymous server calculate alternative user previous moment according to the coordinate record of alternative user historical juncture
Speed;According to coordinate record, anonymous server calculates the distance of user movement, is just used with distance divided by corresponding time
The speed at family;
6th step, anonymous server calculate each alternative user and enter and stay according to normpdf
Probability on initial anonymous section;The user velocity that the average and variance of probability density function are respectively equal to obtain by fitting becomes
The average and variance of change, to each alternative user, the path stayed according to alternative user on initial anonymous section and alternative use
The speed of family last moment obtains a speed variation, and a speed variation is all corresponded to per paths, represents alternative
User on the premise of the paths are selected, current alternative user velocity variations that and if only if within the range, alternative user energy
Into initial anonymous section;
7th step, anonymous server calculate current time initially in anonymous section, at least general containing k-m alternative user
Rate, if probable value is more than 0.9, the 9th step is performed, otherwise, perform the 8th step, wherein, k represents privacy of user demand, and m is represented
The number of user is asked in initial anonymous section;
8th step, anonymous server according to initial position of the anonymous section in road network, random selection one with just
Begin the initial anonymous section of road addition that anonymous section directly connects, to form new anonymous section, anonymous server will initially be hidden
Name section is updated to this new anonymous section, performs the first step;
Initial anonymous section is divided into two cross-talk sections by the 9th step, anonymous server, and sub- road is as new where taking family
Anonymous section, and judge whether new anonymous section meets the needs of user, if satisfied, then repeating the 9th step until discontented
Foot;If not satisfied, then perform the tenth step;If initial anonymous section does not meet privacy of user demand, but new after expanding
Anonymous section meets the privacy requirement of user, then the section newly added is divided into two sections, chooses adjacent with a upper section
One section of road, form new anonymous section;Anonymous server checks whether this section meets the privacy requirements of user, if full
Foot, then continue executing with initial anonymous section and do not meet step in privacy of user demand;If be unsatisfactory for, the tenth is performed
Step;
Tenth step, anonymous server is using the original initial anonymous section anonymous section final as user;
User's request R is converted to new request R'=(u', c, r) by the 11st step, anonymous server, and wherein R' represents to hide
User's request after name server process, u' and c represent false identity and anonymous section of the anonymous server for user's generation respectively,
R represents the request content of user.
Further, the formula of CA calculating Hash matrix Hs is in step 1):
BSj in step 3) for each R time it is tagged after re-encrypted, each R times label and it is corresponding at random
Number information forms encryption information, specifically includes following steps:BSj selection labels tagj1 is tagged to random number, encryption information
For
After the hash value of random number in step 4) matches with H hash value, the user of corresponding label is by verifying, specifically
Comprise the following steps:Judge random number hash value and H hash value whether the match is successful, if so, DB is sent to BSj can use letter
The encryption information of road setWherein Sj is set of available channels in the range of Cj;Otherwise DB is sent to BSj
Step 5) specifically includes following steps:BSj decrypts available channel information, and whether the match is successful by checking tagj1, if
It is that a most suitable channel chj is selected in the Sj in the range of Cj, the encryption information after chj is encrypted sends to SUj, added
Confidential information isOtherwise regardless of allocating channel information;
Channel use information in step 6) is EDB(BSj,ch,t);
It is further comprising the steps of after step 6):
7):Finished when cognitive user Hash sequence uses be present, or the newly increase of user, it is necessary to apply for Hash again to CA
During sequence string, CA renewal Hash matrixes are simultaneously sent to DB.
A kind of Internet of Things signal transmission system based on wireless network provided in an embodiment of the present invention is provided with:
Wireless receiver, network interface, internal memory, display screen, input equipment, processor, operating system, Internet of Things Network Communication
Device, storage medium, the first login authorization module, the second login authorization module, instant messaging transmission channel establish module, network
Signaling transit module, equipment operating data receiving module and trigger module;
The first login authorization module, the second login authorization module, instant messaging transmission channel establish module, network letter
Transit module, equipment operating data receiving module and trigger module is made to be integrated on Internet of Things communicator;
The wireless receiver is connected with network interface;The memory modules, display screen, input equipment, processor, behaviour
Make system, storage medium is connected with network interface cable.
It is provided in an embodiment of the present invention it is a kind of realize described in the Internet of Things method for transmitting signals based on wireless network calculating
Machine program.
A kind of computer for being equipped with the computer program provided in an embodiment of the present invention.
A kind of computer-readable recording medium provided in an embodiment of the present invention, including instruction, when it runs on computers
When so that computer performs described method.
The present invention is verified using random number Hash, DB and BS is distributed channel to legal cognitive user, and
And add the difficulty of attacker.
The present invention makes full use of the characteristics of network, it is proposed that the concept of any active ues and inactive users, is hidden by analysis
The historical position data of name server storage, predict the distribution situation of inactive users.The present invention is due to utilizing inactive users
To carry out position anonymity and original anonymous region is reduced into anonymous section, the premise of privacy of user demand can ensured
The smaller anonymous region of lower generation, so as to ensure that service quality, while decreases communication overhead.
Brief description of the drawings
Fig. 1 is the Internet of Things signal transmission system structural representation provided in an embodiment of the present invention based on wireless network;
Fig. 2 is that the wireless receiver of the Internet of Things signal transmission system provided in an embodiment of the present invention based on wireless network shows
It is intended to;
In figure:1st, wireless receiver;2nd, network interface;3rd, memory modules;4th, display screen;5th, input equipment;6th, handle
Device;7th, operating system;8th, Internet of Things communicator;9th, storage medium;10th, first authorization module is logged in;11st, second mandate is logged in
Module;12nd, instant messaging transmission channel establishes module;13rd, network signal transit module;14th, equipment operating data receiving module;
15th, trigger module.
Embodiment
In order to further understand the content, features and effects of the present invention, hereby enumerating following examples, and coordinate accompanying drawing
Describe in detail as follows.
The structure of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in figure 1, the Internet of Things signal transmission system based on wireless network described in the embodiment of the present invention includes:Wirelessly
Receiver 1;Network interface 2;Memory modules 3;Display screen 4;Input equipment 5;Processor 6;Operating system 7;Internet of Things Network Communication
Device 8;Storage medium 9;First logs in authorization module 10;Second logs in authorization module 11;Instant messaging transmission channel establishes mould
Block 12;Network signal transit module 13;Equipment operating data receiving module 14;Trigger module 15.
The first login authorization module 10, second logs in authorization module 11, instant messaging transmission channel establishes module 12,
Network signal transit module 13, equipment operating data receiving module 14 and trigger module 15 are integrated in Internet of Things communicator 8
On;
The wireless receiver 1 is connected with network interface 2;The memory modules 3, display screen 4, input equipment 5, processing
Device 6, operating system 7, storage medium 9 with the wired connection of network interface 1.
Internet of Things method for transmitting signals provided in an embodiment of the present invention based on wireless network, including:
First stepped on by what wireless network received carrying from the first user terminal the first instant communication users identify
Record request, and complete the login Authorized operation to first user terminal;Carrying from network access equipment is received to set
Second logging request of standby mark, and complete the login Authorized operation to the network access equipment;
Instant messaging is established according to first instant communication users mark of the first association and the device identification
Transmission channel;By the instant messaging transmission channel to being transmitted between first user terminal and the network access equipment
Network signal carry out transfer;
Receive the facility information for the network access equipment that first user terminal is obtained and sent;
Identified according to the facility information distributing equipment, and establish the first instant communication users mark and the equipment
First association of mark;
The device identification is passed to by the network access equipment by first user terminal;
When first user terminal is got and the of first instant communication users mark with social networks chain
After two instant communication users mark, receive and carry the device identification and described second transmitted by first user terminal
The collaborative share request of instant communication users mark;
Asked to identify the second user terminal logged in hair to second instant communication users according to the collaborative share
The collaborative share is sent to ask;
Receive the second user terminal and the shared feedback of returned accepting device is asked according to the collaborative share
Afterwards, establish the device identification and second instant communication users identify second associates;
Receive the equipment operating data for the corresponding device attribute that the network access equipment periodically reports;
Detect that the equipment operating data meets to trigger predetermined registration operation during preset trigger condition;
Receive the association for carrying device identification that first user terminal is sent and release request;
Request is released according to the association and releases first association and/or second association.
The wireless network connects the login Authorized operation to the network access equipment, including:1) authentication center CA is generated
Random number sequence matrix R, R={ Rmn }, (1≤m≤N), (1≤n≤N);CA calculates hash Hash matrix Hs according to R and sends out H
Deliver to database D B;M × n random number is randomly assigned to M cognitive user by R by CA with behavior unit, and cognitive user SUj is obtained
The random number sequence set note Rj (1≤j≤M) obtained, goes to step 2);
2):Base station BS js of the SUj by control channel into the region Cj where it, send the channel request information of encryption
EBSj (Rj1, t), t are the time, go to step 3);
3):BSj collects all EBSj that t receives and decrypts the sequence string received, obtains a series of secondary user
Information R times;BSj is each R times tagged rear re-encrypted, and each R times label and corresponding random number information are formed
Encryption information;BSj sends each R times encryption information to DB, goes to step 4);
4):After random number in encryption information is decrypted DB, the hash value that random number is calculated in Hash is carried out, with
After the hash value of machine number matches with H hash value, the user of corresponding label passes through checking;DB is by the label and Cj by checking
Usable spectrum information encrypt and to form available channel information after, send to BSj, DB and delete the hash value matched in H, go to step
It is rapid 5);
5):BSj is to distribute channel by the cognitive user of checking according to available channel information, goes to step S6;
6):BSj registration channel use informations in DB;
First logging request of first user terminal, including:
Step 1, user send location Based service to anonymous server and asked, identity of the service request including user,
The geographical coordinate of user, at the time of send request, the privacy requirements of the content of request and user;Privacy requirements refer to user couple
The requirement of user's number in the anonymous section of anonymous server generation;
Step 2, anonymous server initialization;
Step 3, generate initial anonymous region;Anonymous server receives user's request, generates initial anonymous region, statistics
Current time initially in anonymous section all request users numbers;
Step 4, predict the successful probability of user anonymity;
Step 5, returns to Query Result, and the user after processing is asked R', is sent to offer location-based service by anonymous server
Server;Anonymous server obtains Query Result set from the server for providing location-based service;Anonymous server is according to user
Actual position the Query Result of most suitable user is picked out from Query Result set, and return result to request service
User.
Further, the Internet of Things method for transmitting signals based on wireless network also includes:
Identified according to the first instant communication users and log in Internet of Things service platform;
By the Internet of Things service platform obtain with first instant communication users mark have first associate set
Standby mark;
Network insertion according to the device identification with logging in the Internet of Things service platform with the device identification is set
It is standby to establish the instant messaging transmission channel that transfer is carried out by the Internet of Things service platform;
The transmission of network signal is carried out by the instant messaging transmission channel and the network access equipment;
Obtain the facility information of network access equipment;
The facility information is sent to the Internet of Things service platform, the Internet of Things service platform is set according to
Standby information distributing equipment identifies, and establishes the first instant communication users mark and associated with the first of the device identification;
Receive the device identification that the Internet of Things service platform is fed back and be sent to the network access equipment, it is described to set
It is standby to identify for making the network access equipment log in the Internet of Things service platform according to the device identification;
Obtain and identified with second instant communication users of first instant communication users mark with social networks chain;It is logical
The Internet of Things service platform is crossed to the user that the Internet of Things service platform is logged in second instant communication users mark
Terminal sends the collaborative share request for carrying the device identification, the Internet of Things service platform is being received the user
After the shared feedback of accepting device that terminal returns, the of the device identification and second instant communication users mark is established
Two associations;
The Internet of Things service platform is received in the corresponding device category for detecting that the network access equipment periodically reports
The equipment operating data of property meets presetting message transmitted during preset trigger condition;
The association releasing request for carrying device identification is sent to the Internet of Things service platform, makes the Internet of Things service
Platform releases request according to the association and releases first association and/or second association.
Step 2 specifically includes:
The first step, anonymous server generate a file, store the coordinate of the central point of every road in road network, in
Heart coordinate is a two-dimensional coordinate, the as transverse and longitudinal coordinate of central point, every road herein be defined as on this section except
Outside the crossing at both ends, the stretch without other crossings;
Second step, calculate crossing probability transfer matrix;Probability transfer matrix is as follows:
Wherein, M (v) represents the probability transfer matrix of crossing v in road network, and subscript 1 to n represents to contain in road network
Identical crossing v road number, pi,jRepresent to be in the probability that the user of road j in road network moves to road i, pi,j=
Ni,j/Nj, Ni,jRepresent the number of users moved from road j to road i, NjRepresent the number of users on road j;
3rd step, according to substantial amounts of historical data in anonymous server is stored in, by estimating that user velocity changes equal
Value and variance, fitting user velocity change;The sample of fitting user velocity change at least chooses 10000;Velocity variations refer to
Difference of the user in adjacent moment speed;
The successful probability of prediction user anonymity of step 4 specifically includes:
The first step, anonymous server judge whether initial anonymous section meets the privacy requirements of user, if satisfied, performing the
Ten steps, otherwise, perform second step;Anonymous server judges whether initial anonymous section meets that the process of privacy of user demand is:
The request that anonymous server receives according to current time, all user's numbers that request is sent in initial anonymous section are calculated,
If the number of all request users is more than the privacy requirements of user, initial anonymous section meets the privacy requirements of user, otherwise,
Initial anonymous section is unsatisfactory for the privacy requirements of user;
Second step, initially anonymous section, the situation expansion being connected by road in road network it will turn into a new section,
Twice of the section that the difference in the new section and initial anonymous section is equal to maximum speed value is all expanded, and expands into new section
Method:Using the both ends crossing in initial anonymous section as starting point, respectively with the distance of maximum speed value size to directly phase
Road even is expanded, and all sections for meeting above-mentioned condition are all expanded, maximal rate of user etc. in road network
Speed limit in road network on road, under the constraint of traffic rules, the velocity amplitude of user is no more than the higher limit;
3rd step, anonymous server searches current time without request from substantial amounts of historical data, but ask the visitor in for previous moment
Ask, and the user in new section, user is formed into alternative user collection, because the user of alternative user concentration is at current time
Without request, anonymous server can not judge the position at these user's current times, but alternative user is located at initially at current time
On anonymous section;
4th step, anonymous server read the transfer square at crossing in initial anonymous section both ends crossing and rear expansion road
Battle array, calculates specific probable value;Probability is equal to the probability that alternative user selects a paths;
5th step, anonymous server calculate alternative user previous moment according to the coordinate record of alternative user historical juncture
Speed;According to coordinate record, anonymous server calculates the distance of user movement, is just used with distance divided by corresponding time
The speed at family;
6th step, anonymous server calculate each alternative user and enter and stay according to normpdf
Probability on initial anonymous section;The user velocity that the average and variance of probability density function are respectively equal to obtain by fitting becomes
The average and variance of change, to each alternative user, the path stayed according to alternative user on initial anonymous section and alternative use
The speed of family last moment obtains a speed variation, and a speed variation is all corresponded to per paths, represents alternative
User on the premise of the paths are selected, current alternative user velocity variations that and if only if within the range, alternative user energy
Into initial anonymous section;
7th step, anonymous server calculate current time initially in anonymous section, at least general containing k-m alternative user
Rate, if probable value is more than 0.9, the 9th step is performed, otherwise, perform the 8th step, wherein, k represents privacy of user demand, and m is represented
The number of user is asked in initial anonymous section;
8th step, anonymous server according to initial position of the anonymous section in road network, random selection one with just
Begin the initial anonymous section of road addition that anonymous section directly connects, to form new anonymous section, anonymous server will initially be hidden
Name section is updated to this new anonymous section, performs the first step;
Initial anonymous section is divided into two cross-talk sections by the 9th step, anonymous server, and sub- road is as new where taking family
Anonymous section, and judge whether new anonymous section meets the needs of user, if satisfied, then repeating the 9th step until discontented
Foot;If not satisfied, then perform the tenth step;If initial anonymous section does not meet privacy of user demand, but new after expanding
Anonymous section meets the privacy requirement of user, then the section newly added is divided into two sections, chooses adjacent with a upper section
One section of road, form new anonymous section;Anonymous server checks whether this section meets the privacy requirements of user, if full
Foot, then continue executing with initial anonymous section and do not meet step in privacy of user demand;If be unsatisfactory for, the tenth is performed
Step;
Tenth step, anonymous server is using the original initial anonymous section anonymous section final as user;
User's request R is converted to new request R'=(u', c, r) by the 11st step, anonymous server, and wherein R' represents to hide
User's request after name server process, u' and c represent false identity and anonymous section of the anonymous server for user's generation respectively,
R represents the request content of user.
The formula of CA calculating Hash matrix Hs is in step 1):
BSj in step 3) for each R time it is tagged after re-encrypted, each R times label and it is corresponding at random
Number information forms encryption information, specifically includes following steps:BSj selection labels tagj1 is tagged to random number, encryption information
For
After the hash value of random number in step 4) matches with H hash value, the user of corresponding label is by verifying, specifically
Comprise the following steps:Judge random number hash value and H hash value whether the match is successful, if so, DB is sent to BSj can use letter
The encryption information of road setWherein Sj is set of available channels in the range of Cj;Otherwise DB is sent to BSj
Step 5) specifically includes following steps:BSj decrypts available channel information, and whether the match is successful by checking tagj1, if
It is that a most suitable channel chj is selected in the Sj in the range of Cj, the encryption information after chj is encrypted sends to SUj, added
Confidential information isOtherwise regardless of allocating channel information;
Channel use information in step 6) is EDB(BSj,ch,t);
It is further comprising the steps of after step 6):
7):Finished when cognitive user Hash sequence uses be present, or the newly increase of user, it is necessary to apply for Hash again to CA
During sequence string, CA renewal Hash matrixes are simultaneously sent to DB.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real
It is existing.When using whole or in part realizing in the form of a computer program product, the computer program product include one or
Multiple computer instructions.When loading on computers or performing the computer program instructions, produce whole or in part according to
Flow or function described in the embodiment of the present invention.The computer can be all-purpose computer, special-purpose computer, computer network
Network or other programmable devices.The computer instruction can store in a computer-readable storage medium, or from one
Computer-readable recording medium transmits to another computer-readable recording medium, for example, the computer instruction can be from one
Individual web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission).The computer read/write memory medium can be that any usable medium that computer can access either includes one
The data storage devices such as the integrated server of individual or multiple usable mediums, data center.The usable medium can be that magnetic is situated between
Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disc Solid
State Disk (SSD)) etc..
It is described above to be only the preferred embodiments of the present invention, any formal limitation not is made to the present invention,
Every technical spirit according to the present invention belongs to any simple modification made for any of the above embodiments, equivalent variations and modification
In the range of technical solution of the present invention.
Claims (8)
- A kind of 1. Internet of Things method for transmitting signals based on wireless network, it is characterised in that the Internet of Things based on wireless network Net method for transmitting signals includes:Receiving the first login for carrying the first instant communication users mark from the first user terminal by wireless network please Ask, and complete the login Authorized operation to first user terminal;Receive and carry equipment mark from network access equipment The second logging request known, and complete the login Authorized operation to the network access equipment;Instant messaging transmission is established according to first instant communication users mark of the first association and the device identification Passage;By the instant messaging transmission channel to the net that is transmitted between first user terminal and the network access equipment Network signaling carries out transfer;Receive the facility information for the network access equipment that first user terminal is obtained and sent;Identified according to the facility information distributing equipment, and establish the first instant communication users mark and the device identification First association;The device identification is passed to by the network access equipment by first user terminal;When first user terminal is got with second of first instant communication users mark with social networks chain i.e. When communication user mark after, receive and carry the device identification and described second instant transmitted by first user terminal The collaborative share request of communication user mark;Asked to identify the second user terminal logged in transmission institute to second instant communication users according to the collaborative share State collaborative share request;After the second user terminal is received according to the shared feedback of the returned accepting device of collaborative share request, build Stand the device identification and second instant communication users identify second associates;Receive the equipment operating data for the corresponding device attribute that the network access equipment periodically reports;Detect that the equipment operating data meets to trigger predetermined registration operation during preset trigger condition;Receive the association for carrying device identification that first user terminal is sent and release request;Request is released according to the association and releases first association and/or second association;The wireless network connects the login Authorized operation to the network access equipment, including:1) authentication center CA generations are random Number sequence column matrix R, R={ Rmn }, (1≤m≤N), (1≤n≤N);CA according to R calculate hash Hash matrix Hs and by H send to Database D B;M × n random number is randomly assigned to M cognitive user by R by CA with behavior unit, what cognitive user SUj was obtained Random number sequence set note Rj (1≤j≤M), goes to step 2);2):Base station BS js of the SUj by control channel into the region Cj where it, send the channel request information EBSj of encryption (Rj1, t), t are the time, go to step 3);3):BSj collects all EBSj that t receives and decrypts the sequence string received, obtains a series of secondary user profile R times;BSj is each R times tagged rear re-encrypted, and each R times label and corresponding random number information form encryption Information;BSj sends each R times encryption information to DB, goes to step 4);4):After random number in encryption information is decrypted DB, the hash value that random number is calculated in Hash, random number are carried out Hash value matched with H hash value after, the user of corresponding label passes through checking;DB by the label and Cj by checking can Encrypted with spectrum information after forming available channel information, send to BSj, DB and delete the hash value matched in H, go to step 5);5):BSj is to distribute channel by the cognitive user of checking according to available channel information, goes to step S6;6):BSj registration channel use informations in DB;7):Finished when cognitive user Hash sequence uses be present, or the newly increase of user, it is necessary to apply for Hash sequences to CA again During string, CA renewal Hash matrixes are simultaneously sent to DB;First logging request of first user terminal, including:Step 1, user send location Based service request to anonymous server, and service request includes the identity of user, user Geographical coordinate, send request at the time of, request content and user privacy requirements;Privacy requirements refer to user to anonymity The requirement of user's number in the anonymous section of server generation;Step 2, anonymous server initialization;Step 3, generate initial anonymous region;Anonymous server receives user's request, generates initial anonymous region, and statistics is current Moment initially in anonymous section all request users numbers;Step 4, predict the successful probability of user anonymity;Step 5, Query Result is returned to, the user after processing is asked R' by anonymous server, is sent to the clothes for providing location-based service Business device;Anonymous server obtains Query Result set from the server for providing location-based service;Anonymous server is according to the true of user The Query Result of most suitable user is picked out in real position from Query Result set, and returns result to the use of request service Family.
- 2. the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1, it is characterised in that it is described based on The Internet of Things method for transmitting signals of wireless network also includes:Identified according to the first instant communication users and log in Internet of Things service platform;Obtained by the Internet of Things service platform has the first equipment mark associated with first instant communication users mark Know;Built according to the device identification with logging in the network access equipment of the Internet of Things service platform with the device identification The vertical instant messaging transmission channel that transfer is carried out by the Internet of Things service platform;The transmission of network signal is carried out by the instant messaging transmission channel and the network access equipment;Obtain the facility information of network access equipment;The facility information is sent to the Internet of Things service platform, the Internet of Things service platform is believed according to the equipment Distributing equipment mark is ceased, and establishes the first instant communication users mark and is associated with the first of the device identification;Receive the device identification that the Internet of Things service platform is fed back and be sent to the network access equipment, the equipment mark Know for making the network access equipment log in the Internet of Things service platform according to the device identification;Obtain and identified with second instant communication users of first instant communication users mark with social networks chain;Pass through institute Internet of Things service platform is stated to the user terminal that the Internet of Things service platform is logged in second instant communication users mark The collaborative share request for carrying the device identification is sent, the Internet of Things service platform is being received the user terminal After the shared feedback of the accepting device of return, the second pass of the device identification and second instant communication users mark is established Connection;Receive the Internet of Things service platform and detect corresponding device attribute that the network access equipment periodically reports Equipment operating data meets presetting message transmitted during preset trigger condition;The association releasing request for carrying device identification is sent to the Internet of Things service platform, makes the Internet of Things service platform Request is released according to the association and releases first association and/or second association.
- 3. the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1, it is characterised in thatStep 2 specifically includes:The first step, anonymous server generate a file, store the coordinate of the central point of every road in road network, and center is sat Mark is a two-dimensional coordinate, the as transverse and longitudinal coordinate of central point, and every road herein is defined as on this section except both ends Crossing outside, the stretch without other crossings;Second step, calculate crossing probability transfer matrix;Probability transfer matrix is as follows:Wherein, M (v) represents the probability transfer matrix of crossing v in road network, and subscript 1 to n is represented in road network containing identical Crossing v road number, pi,jRepresent to be in the probability that the user of road j in road network moves to road i, pi,j=Ni,j/ Nj, Ni,jRepresent the number of users moved from road j to road i, NjRepresent the number of users on road j;3rd step, according to being stored in substantial amounts of historical data in anonymous server, by estimate average that user velocity changes and Variance, fitting user velocity change;The sample of fitting user velocity change at least chooses 10000;Velocity variations refer to user In the difference of adjacent moment speed;The successful probability of prediction user anonymity of step 4 specifically includes:The first step, anonymous server judge whether initial anonymous section meets the privacy requirements of user, if satisfied, performing the tenth Step, otherwise, perform second step;Anonymous server judges whether initial anonymous section meets that the process of privacy of user demand is:Hide The request that name server receives according to current time, all user's numbers that request is sent in initial anonymous section are calculated, if The number of all request users is more than the privacy requirements of user, then initial anonymous section meets the privacy requirements of user, otherwise, just Anonymous section of beginning is unsatisfactory for the privacy requirements of user;Second step, initially anonymous section, the situation expansion being connected by road in road network it will turn into a new section, this is new Twice of the section that the difference in section and initial anonymous section is equal to maximum speed value is all expanded, and expands into the side in new section Method:Using the both ends crossing in initial anonymous section as starting point, respectively with the distance of maximum speed value size to directly connected Road is expanded, and all sections for meeting above-mentioned condition are all expanded, and the maximal rate of user is equal to road in road network Speed limit in road network on road, under the constraint of traffic rules, the velocity amplitude of user is no more than the higher limit;3rd step, anonymous server searches current time without request from substantial amounts of historical data, but previous moment has request, and User in new section, by user form alternative user collection, due to alternative user concentrate user current time without please Ask, anonymous server can not judge the position at these user's current times, but alternative user is located at initial anonymity at current time On section;4th step, anonymous server read the transfer matrix at crossing in initial anonymous section both ends crossing and rear expansion road, calculated Go out specific probable value;Probability is equal to the probability that alternative user selects a paths;5th step, anonymous server is according to the coordinate record of alternative user historical juncture, the speed of calculating alternative user previous moment Degree;According to coordinate record, anonymous server calculates the distance of user movement, just obtains user's with distance divided by corresponding time Speed;6th step, anonymous server calculate each alternative user and enter and stay in initial according to normpdf Probability on anonymous section;What the user velocity that the average and variance of probability density function are respectively equal to obtain by fitting changed Average and variance, to each alternative user, stayed according to alternative user on path and alternative user on initial anonymous section The speed at one moment obtains a speed variation, and a speed variation is all corresponded to per paths, represents alternative user On the premise of the paths are selected, within the range, alternative user can enter current alternative user velocity variations that and if only if Initial anonymous section;7th step, anonymous server calculate current time initially in anonymous section, at least the probability containing k-m alternative user, If probable value is more than 0.9, the 9th step is performed, otherwise, performs the 8th step, wherein, k represents privacy of user demand, and m represents initial The number of user is asked in anonymous section;8th step, anonymous server is according to initial position of the anonymous section in road network, and random selection one is with initially hideing The road that name section directly connects adds initial anonymous section, forms new anonymous section, and anonymous server will initial anonymous road Section is updated to this new anonymous section, performs the first step;Initial anonymous section is divided into two cross-talk sections by the 9th step, anonymous server, and sub- road where taking family is hidden as new Name section, and judge whether new anonymous section meets the needs of user, if satisfied, then repeating the 9th step until being unsatisfactory for; If not satisfied, then perform the tenth step;If initial anonymous section does not meet privacy of user demand, but the new anonymity after expanding Section meets the privacy requirement of user, then the section newly added is divided into two sections, chooses one section adjacent with a upper section Road, form new anonymous section;Anonymous server checks whether this section meets the privacy requirements of user, if it is satisfied, then Continue executing with initial anonymous section and do not meet step in privacy of user demand;If be unsatisfactory for, the tenth step is performed;Tenth step, anonymous server is using the original initial anonymous section anonymous section final as user;User's request R is converted to new request R'=(u', c, r) by the 11st step, anonymous server, and wherein R' represents anonymous clothes User's request after business device processing, u' and c represent false identity and anonymous section of the anonymous server for user's generation, r tables respectively Show the request content of user.
- 4. the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1, it is characterised in thatThe formula of CA calculating Hash matrix Hs is in step 1):BSj in step 3) is each R times tagged rear re-encrypted, each R times label and corresponding random number letter Breath forms encryption information, specifically includes following steps:BSj selection labels tagj1 is tagged to random number, and encryption information isAfter the hash value of random number in step 4) matches with H hash value, the user of corresponding label is specifically included by checking Following steps:Judge random number hash value and H hash value whether the match is successful, if so, DB sends set of available channels to BSj Encryption informationWherein Sj is set of available channels in the range of Cj;Otherwise DB is sent to BSjStep 5) specifically includes following steps:BSj decrypts available channel information, and whether the match is successful by checking tagj1, if so, A most suitable channel chj is selected in Sj in the range of Cj, after chj is encryptedEncryption information is sent to SUj, encryption informationOtherwise regardless of allocating channel information;Channel use information in step 6) is EDB(BSj,ch,t)。
- A kind of 5. Internet of Things based on wireless network of the Internet of Things method for transmitting signals based on wireless network as claimed in claim 1 Net signal transmission system, it is characterised in that the Internet of Things signal transmission system based on wireless network is provided with:Wireless receiver, network interface, internal memory, display screen, input equipment, processor, operating system, Internet of Things Network Communication dress Put, storage medium, the first login authorization module, the second login authorization module, instant messaging transmission channel establish module, network letter Make transit module, equipment operating data receiving module and trigger module;The first login authorization module, the second login authorization module, instant messaging transmission channel are established in module, network signal Revolving die block, equipment operating data receiving module and trigger module are integrated on Internet of Things communicator;The wireless receiver is connected with network interface;The memory modules, display screen, input equipment, processor, operation system System, storage medium are connected with network interface cable.
- A kind of 6. calculating for realizing the Internet of Things method for transmitting signals based on wireless network described in Claims 1 to 4 any one Machine program.
- A kind of 7. computer for being equipped with computer program described in claim 6.
- 8. a kind of computer-readable recording medium, including instruction, when run on a computer so that computer is performed as weighed Profit requires the method described in 1-4 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711373249.7A CN107846660A (en) | 2017-12-19 | 2017-12-19 | A kind of Internet of Things method for transmitting signals and system based on wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711373249.7A CN107846660A (en) | 2017-12-19 | 2017-12-19 | A kind of Internet of Things method for transmitting signals and system based on wireless network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107846660A true CN107846660A (en) | 2018-03-27 |
Family
ID=61663428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711373249.7A Pending CN107846660A (en) | 2017-12-19 | 2017-12-19 | A kind of Internet of Things method for transmitting signals and system based on wireless network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107846660A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359088A (en) * | 2018-10-17 | 2019-02-19 | 武汉市快讯通信息技术有限公司 | A kind of increased value service system and value-added service method based on mobile radio communication |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110176508A1 (en) * | 2008-12-08 | 2011-07-21 | Onur Altintas | Frequency Band Coordination Method and Radio Communication Apparatus in Cognitive Radio System |
CN104540130A (en) * | 2015-01-06 | 2015-04-22 | 西安电子科技大学 | Self coexistence channel selection method based on Hash matching in cognitive radio network |
CN104780173A (en) * | 2015-04-16 | 2015-07-15 | 西安电子科技大学 | System and method for selecting anonymous road section under location privacy protection in road network |
CN105553921A (en) * | 2014-10-31 | 2016-05-04 | 腾讯科技(上海)有限公司 | Internet of things communication method and apparatus, and internet of things communication system |
-
2017
- 2017-12-19 CN CN201711373249.7A patent/CN107846660A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110176508A1 (en) * | 2008-12-08 | 2011-07-21 | Onur Altintas | Frequency Band Coordination Method and Radio Communication Apparatus in Cognitive Radio System |
CN105553921A (en) * | 2014-10-31 | 2016-05-04 | 腾讯科技(上海)有限公司 | Internet of things communication method and apparatus, and internet of things communication system |
CN104540130A (en) * | 2015-01-06 | 2015-04-22 | 西安电子科技大学 | Self coexistence channel selection method based on Hash matching in cognitive radio network |
CN104780173A (en) * | 2015-04-16 | 2015-07-15 | 西安电子科技大学 | System and method for selecting anonymous road section under location privacy protection in road network |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359088A (en) * | 2018-10-17 | 2019-02-19 | 武汉市快讯通信息技术有限公司 | A kind of increased value service system and value-added service method based on mobile radio communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liao et al. | Location and trajectory privacy preservation in 5G-Enabled vehicle social network services | |
Wan et al. | Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing | |
Jiau et al. | Multimedia services in cloud-based vehicular networks | |
CN106162804B (en) | For the method and apparatus for the access information for providing wireless access focus | |
US9465950B2 (en) | Methods, apparatuses, and computer-readable storage media for securely accessing social networking data | |
CN105554704B (en) | Location privacy protection method based on false track in recommender system | |
Sun et al. | Towards privacy preservation for “check-in” services in location-based social networks | |
CN103188270A (en) | Method, device and system for accessing recommended server to IP address | |
CN104936141B (en) | LBS method for protecting track privacy based on location tags | |
CN110351806A (en) | A kind of transmission method and system of block chain electronic health care medical record information | |
CN110505627A (en) | A kind of authentication method and device based on access node group | |
CN104012130B (en) | Communication security processing method and processing device | |
CN105430615A (en) | Location privacy protection method based on false locations under continuous location service requests | |
CN101998407B (en) | WLAN access authentication based method for accessing services | |
Li et al. | Privacy-preserving participant grouping for mobile social sensing over edge clouds | |
CN105978790A (en) | Bluetooth-based robot social contact system and apparatus | |
Wang et al. | ClusterRep: A cluster-based reputation framework for balancing privacy and trust in vehicular participatory sensing | |
CN103686947A (en) | Message transmission method and device based on virtual AP | |
He et al. | Privacy and incentive mechanisms in people-centric sensing networks | |
CN107846660A (en) | A kind of Internet of Things method for transmitting signals and system based on wireless network | |
CN106911659A (en) | One seed account information processing system, method and device | |
CN107257292B (en) | A kind of cross-domain distributed big data communication system design planning method | |
CN107005576A (en) | The bridge joint matching identification symbol for link identifiers is generated from server log | |
Liu et al. | Bilateral privacy-utility tradeoff in spectrum sharing systems: A game-theoretic approach | |
Carbunar et al. | Private badges for geosocial networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180327 |
|
RJ01 | Rejection of invention patent application after publication |