CN108683492A - A kind of credible wireless sensor and control method - Google Patents
A kind of credible wireless sensor and control method Download PDFInfo
- Publication number
- CN108683492A CN108683492A CN201810398711.7A CN201810398711A CN108683492A CN 108683492 A CN108683492 A CN 108683492A CN 201810398711 A CN201810398711 A CN 201810398711A CN 108683492 A CN108683492 A CN 108683492A
- Authority
- CN
- China
- Prior art keywords
- module
- metric
- program
- processing
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
Abstract
The invention discloses a kind of credible wireless sensor and control methods, the creditable calculation modules for wireless sensor that this is credible obtain the program data in processing and control module, data acquisition module, the respective hardware sequence number of wireless communication module and processing and control module and calculate metric, metric is compared with preset value, and control instruction is generated according to comparison result;Processing and control module receives the control instruction that creditable calculation modules are sent, and enabled instruction is generated according to control instruction, with log-on data acquisition module and wireless communication module;Data collecting module collected sensing data is simultaneously sent to the processing and control module;The sensor network transmission sensing data that wireless communication module is constituted between multiple credible wireless sensors.Credible wireless sensor and control method provided by the invention can protect the soft hardware integrality of wireless sensor, realize the enhancing to wireless sensor ontological security, and solid foundation has been established to build safe and reliable wireless sensor network.
Description
Technical field
The present invention relates to field of power communication, and in particular to a kind of credible wireless sensor and control method.
Background technology
Wireless sensor network (Wireless Sensor Networks, WSN) is a kind of distributed sensor, it
Tip is the sensor that can perceive and check the external world.Sensor wirelessly communicates, therefore network settings are flexible,
Device location can be changed at any time, the multihop self-organizing network that mode is formed by radio communication.Wireless sensor network
In sensor type mainly include sensor node, aggregation node and management node.The composition and function packet of wireless sensor
Include following four basic units:Sensing unit (being made of sensor and analog-digital conversion function module), processing unit are (by embedded
System is constituted, including CPU, memory, embedded OS etc.), communication unit (being made of wireless communication module) and electricity
Source part.
Wireless sensor technology has been widely applied in all kinds of scenes of internet of things including electric system.So
And existing wireless sensor often considers that functional performance requires more and ignores protecting information safety in design, not
Corresponding security protection verification means are set for wireless sensor, attacker may easily obtain the secret of wireless sensor
Program code in information, modification sensing node, such as so that sensing node has multiple identity ID, to passed with multiple identity
It is communicated in sensor network, in addition, attacker can also be by obtaining the letters such as the key, the code that are stored in wireless sensor
Breath, to which forgery or the legitimate node that disguises oneself as are added in sensing network.Once controlling the part section in sensor network
After point, attacker can start a variety of attacks, as monitored the information transmitted in sensor network, be sent out into sensor network
The routing iinformation of cloth vacation or the heat transfer agent of transmission vacation, progress Denial of Service attack etc..
Invention content
Therefore, a kind of credible wireless sensor network framework of present invention offer and control method, it is ensured that wireless sensing
The soft hardware integrality of device solves the problems, such as that the information of wireless sensor network is monitored or transmits dummy message.
A kind of credible wireless sensor provided in an embodiment of the present invention, including:Creditable calculation modules, processing and control module,
Data acquisition module, wireless communication module, wherein:The creditable calculation modules obtain processing and control module, data acquisition module,
Program data in the respective hardware sequence number of wireless communication module and the processing and control module, according to the hardware sequence number
And described program data calculate the data acquisition module, wireless communication module, processing and control module and processing and control module
The metric is compared by the metric of Program with preset value, and generates control instruction according to comparison result;The place
Reason control module receives the control instruction that the creditable calculation modules are sent, and enabled instruction is generated according to the control instruction, with
Start the data acquisition module and wireless communication module;The data collecting module collected sensing data, and by the sensing
Data are sent to the processing and control module;The processing and control module is by the wireless communication module multiple described credible
The sensor network constituted between wireless sensor transmits the sensing data.
Further, the creditable calculation modules, including:Cryptography Attendant sub-module, for obtaining the processing control
Journey in the respective hardware sequence number of module, data acquisition module, wireless communication module and the acquisition processing and control module
Ordinal number evidence, and hardware metric is generated according to the hardware sequence number, carrying out Hash calculation to described program data obtains program
Metric;Integrality store with measurement submodule, for by the hardware metric and the metric of program respectively with it is corresponding
Preset value is compared, and generates the control instruction according to comparison result.
Further, the integrality storage is specifically used for measurement submodule:To in the processing and control module
One program data is measured to obtain the first program metric and is compared with the first preset value, and mould is controlled to the processing
The respective hardware sequence number of block, data acquisition module, wireless communication module measured to obtain hardware metric and with it is second pre-
If value is compared;When the first program metric with first preset value preset by consistent and hardware metric and second
When being worth consistent, the control instruction is generated.
Further, the processing and control module includes:Volatile memory, nonvolatile memory and microcontroller,
The microcontroller judges the sensing data that the data acquisition module is sent whether is received in preset time;If the micro-control
Device processed does not receive the sensing data that the data acquisition module is sent in preset time, and the microcontroller generates suspend mode and refers to
It enables, and the creditable calculation modules is driven to carry out trust computing;The creditable calculation modules calculate in the volatile memory
The second program metric, and store the metric of second program;
The microcontroller stores second program to the nonvolatile memory, and according to the dormancy instruction
The data acquisition module is set to enter dormant state.
Further, the data acquisition module receives the wake-up instruction that microprocessor is sent;The creditable calculation modules
Extract second program from the nonvolatile memory and carry out trust computing, judge second program metric whether
It is consistent with third preset value;If the metric of second program is consistent with third preset value, the creditable calculation modules are to institute
State microprocessor feedback trust computing successful result;The microprocessor is according to the trust computing successful result by described second
Program load wakes up the data acquisition module to the volatile memory.
Further, if the metric and third preset value of second program are inconsistent, the creditable calculation modules to
The microprocessor feeds back trust computing failure result;The microprocessor is according to described in trust computing failure result resetting
Data acquisition module.
Further, the creditable calculation modules further include:Platform data protects submodule, for storing the hardware degree
Magnitude and program metric.
Further, the creditable calculation modules further include:Identity submodule, for providing identity key,
The creditable calculation modules carry out authentication, after being verified, institute according to the requirement of communication protocol to data acquisition module
Processing and control module is stated to receive the data of the data acquisition module transmission and handled.
Further, the credible wireless sensor further includes:Energy supply module, the energy supply module are
The creditable calculation modules, processing and control module, data acquisition module and wireless communication module provide power supply.
The embodiment of the present invention also provides a kind of control method of credible wireless sensor, includes the following steps:It obtains to be tested
The hardware sequence number and program data for demonstrate,proving target object calculate described to be tested according to the hardware sequence number and described program data
The metric for demonstrate,proving target object, the metric is compared with preset value, and generates control instruction according to comparison result;It obtains
The control instruction is taken, enabled instruction is generated according to the control instruction;Sensing data is obtained according to the enabled instruction, and is led to
It crosses the sensor network constituted between multiple credible wireless sensors and transmits the sensing data.
Technical solution of the present invention has the following advantages that:
A kind of credible wireless sensor and control method provided in an embodiment of the present invention, wireless sensor that this is credible it is credible
Computing module obtains processing and control module, data acquisition module, the respective hardware sequence number of wireless communication module and processing control
Mould program data in the block calculates metric, and metric is compared with preset value, and generates control according to comparison result and refer to
It enables;Processing and control module receives the control instruction that creditable calculation modules are sent, and enabled instruction is generated according to control instruction, to start
Data acquisition module and wireless communication module;Data collecting module collected sensing data is simultaneously sent to processing and control module;Wirelessly
The sensor network transmission sensing data that communication module is constituted between multiple credible wireless sensors.It is provided by the invention credible
Wireless sensor and control method first carry out trust computing before carrying out data transmission using wireless sensor, are determining the nothing
In the case of line sensor is believable, just carries out data transmission, therefore, the soft hardware integrality of wireless sensor can be protected,
It realizes the enhancing to wireless sensor ontological security, solid base has been established to build safe and reliable wireless sensor network
Plinth.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, other drawings may also be obtained based on these drawings.
Fig. 1 is the composition figure of a specific example of the credible wireless sensor provided in the embodiment of the present invention;
Fig. 2 is the composition figure of credible another specific example of wireless sensor provided in the embodiment of the present invention;
Fig. 3 is the suspend mode flow chart for providing credible wireless sensor in the embodiment of the present invention;
Fig. 4 is the wake-up flow chart for providing credible wireless sensor in the embodiment of the present invention;
Fig. 5 sheets are the flow of one specific example of control method for providing credible wireless sensor in inventive embodiments
Figure.
Specific implementation mode
Technical scheme of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described implementation
Example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill
The every other embodiment that personnel are obtained without making creative work, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " first ", " second " are used for description purposes only, and cannot
It is interpreted as indicating or implying relative importance.
As long as in addition, technical characteristic involved in invention described below different embodiments non-structure each other
It can be combined with each other at conflict.
Embodiment 1
The embodiment of the present invention provides a kind of credible wireless sensor, as shown in Figure 1, the credible wireless sensor includes:It can
Believe computing module 1, processing and control module 2, data acquisition module 3, wireless communication module 4.
Optionally, in some embodiments of the invention, multiple credible wireless sensors can pass through the wireless communication module 4
Communication connection is established, to build wireless-transmission network.When the credible wireless sensor in the wireless-transmission network will carry out work
When making, first, it is each to obtain processing and control module 2, data acquisition module 3, wireless communication module 4 by the creditable calculation modules 1
From hardware sequence number and processing and control module in 2 program data, according to hardware sequence number and program data calculation processing control
The metric of molding block 2,2 Program of data acquisition module 3, wireless communication module 4 and processing and control module, by metric with
Preset value is compared, and generates control instruction according to comparison result.In a preferred embodiment, as shown in Fig. 2, the credible meter
Calculating module 1 includes:
Cryptography Attendant sub-module 11, for obtaining processing and control module 2, data acquisition module 3, wireless communication module 4
Program data in respective hardware sequence number and acquisition processing and control module 2, and hardware degree is generated according to hardware sequence number
Magnitude carries out Hash calculation to program data and obtains program metric.In a preferred embodiment, cryptography Attendant sub-module 11
Encryption, public key cryptography, to ensure the safe and reliable of data can also be provided to data.
Platform data protects submodule 12, for storage hardware metric and program metric.It, should in the embodiment of the present invention
It includes platform configuration register (PCR) that platform data, which is protected in submodule 12, can save the metric of measure object.
Integrality store with measurement submodule 13, for by hardware metric and the metric of program respectively with it is corresponding pre-
If value is compared, and generates control instruction according to comparison result.In the embodiment of the present invention, integrality storage and measurement submodule
Block 13 stores the integrality preset value of each measure object, to processing and control module 2, data processing module 3, wireless communication module
4 hardware and 2 Program of processing and control module carries out integrity measurement, and creditable calculation modules 1 are according to comparison preset value and measurement
Value judges the integrality of credible wireless sensor software and hardware, and can send out startup, again to processing and control module according to judgement result
The instructions such as set, restore, to carry out security protection.
In a preferred embodiment, integrality storage is specifically used for measurement submodule 13:To in processing and control module 2
First program data is measured to obtain the first program metric and is compared with the first preset value, to processing and control module 2,
Data acquisition module 3,4 respective hardware sequence number of wireless communication module are measured to obtain hardware metric and be preset with second
Value is compared;
When the first program metric is consistent with the first preset value and hardware metric is consistent with the second preset value, generate
Control instruction.In the embodiment of the present invention, when the corresponding preset value of the metric of the metric hardware of program is consistent, explanation
The software and hardware complete safety of credible sensor can issue control instruction to processing and control module 2 in next step and subsequently be counted
According to processing work.
In embodiments of the present invention, the Booting sequence of credible wireless sensor includes:Credible wireless sensor is added
After electricity or resetting, creditable calculation modules 1 carry out integrity measurement to the startup program in processing and control module 2, work as startup program
When consistent with preset value, processing and control module 2 loads and runs startup program, and the measuring procedure in startup program utilizes credible meter
It calculates module 1 and integrity measurement is carried out to main program, when the metric of main program is consistent with preset value, processing and control module 2 adds
Main program is carried and runs, Booting sequence terminates.Record the hardware sequence of modules in the embodiment of the present invention, in startup program
Number, when the sequence number of modules is consistent with preset value, illustrate that hardware is completely reliable, credible wireless sensor can open safely
Dynamic, main program carries out data processing using the hardware of corresponding sequence number.
Identity submodule 14, for providing identity key, for providing identity key, trust computing mould
Block 1 carries out authentication according to the requirement of communication protocol to data acquisition module 3, and after being verified, processing and control module 2 connects
It receives the data that data acquisition module 3 is sent and is handled.In the embodiment of the present invention, which passes through identification
The identity of data acquisition module 3 ensures the safety of gathered data, and operation principle meets national related credible password module mark
Accurate relevant regulations, those skilled in the art can verify the identity of data acquisition module 3 according to the prior art.
Processing and control module 2 receives the control instruction that creditable calculation modules 1 are sent, and generating startup according to control instruction refers to
It enables, with log-on data acquisition module 3 and wireless communication module 4.In embodiments of the present invention, processing and control module 2 is to execute industry
Business calculates and the nucleus module of function, including microprocessor 21, volatile memory 22, nonvolatile storage 23, can receive and
From the dependent instruction of creditable calculation modules 1, reception data processing module 3, radio communication mold are needed according to practical application scene
Block 4 is handled.
Data acquisition module 3 acquires sensing data, and sensing data is sent to processing and control module 2;The present invention is implemented
In example, data acquisition module 3 includes sensing module 31, A/D conversion modules 32, and the data of acquisition are passed through A/D by sensing module 31
After conversion module 32 converts analog signals into digital signal, it is sent to processing and control module 2.
The sensor network that module 4 is constituted between multiple credible wireless sensors by radio communication of processing and control module 2
Network transmission sensing data.In the embodiment of the present invention, wireless communication module includes wireless transceiver 41 and procotol 42, wirelessly
Transceiver 41 carries out transceiving data according to procotol 42 and processing and control module 1.
In practical application, credible wireless sensor gathered data is not needed in preset time, or in preset time model
Enclose interior processing and control module 2 be not received by data acquisition module 3 transmission sensing data when, credible sensor can be stopped
It sleeps, in the embodiment of the present invention, as shown in figure 3, the suspend mode flow of credible wireless sensor includes:
Step S11:Microcontroller 21 judges the sensing number of the transmission of data acquisition module 1 whether is received in preset time
According to;
Step S12:If microcontroller 21 does not receive the sensing data of the transmission of data acquisition module 3 in preset time, micro-
Controller generates dormancy instruction, and creditable calculation modules 1 is driven to carry out trust computing.
Step S13:Creditable calculation modules 1 calculate the metric of the second program in volatile memory 22, and store the
The metric of two programs.
Step S14:Second program is stored to nonvolatile memory 23, and makes number according to dormancy instruction by microcontroller 21
Enter dormant state according to acquisition module 1.
In practical applications, processing and control module 1 needs the periodically credible wireless biography to entering dormant state according to application
Sensor is waken up, or is intercepted to wireless communication module 4, is waken up when discovery has trigger event, the present invention is real
It applies in example, as shown in figure 4, the wake-up flow of credible wireless sensor includes:
Step S21:Data acquisition module 1 receives the wake-up instruction that microprocessor 21 is sent;
Step S22:Creditable calculation modules 1 extract the second program from nonvolatile memory 23 and carry out trust computing, judge
Whether the metric of the second program is consistent with third preset value.
Step S23:If the metric of the second program creditable calculation modules 1 consistent with third preset value are anti-to microprocessor 21
Present trust computing successful result.
Step S24:Microprocessor 21 according to trust computing successful result by the second program load to volatile memory 22,
Wake up data acquisition module 3.
Step S25:If the metric of the second program and third preset value are inconsistent, creditable calculation modules 1 are to microprocessor
21 feedback trust computing failure results;Microprocessor 21 resets data acquisition module 3 according to trust computing failure result.
In a preferred embodiment, above-mentioned credible wireless sensor further includes:Energy supply module 5, energy supply module
Power supply is provided for creditable calculation modules 1, processing and control module 2, data acquisition module 3 and wireless communication module 4.The present invention is implemented
It is creditable calculation modules 1, processing and control module 2, data acquisition module that battery powered mode, normal voltage 5V are used in example
Block 3 and wireless communication module 4 provide power supply and support.
Credible wireless sensor provided in an embodiment of the present invention, by measuring the metric of modules software and hardware, degree of working as
When magnitude is consistent with corresponding preset value, the processes such as subsequent wireless sensing data sampling and processing and transmission are just carried out, are being ensured
The soft hardware integrality of wireless sensor effectively prevent wireless sensing in the case of realizing to wireless sensor ontological security
The information of device network is monitored or transmits dummy message, and solid base has been established to build safe and reliable wireless sensor network
Plinth.
Embodiment 2
The embodiment of the present invention provides a kind of control method of credible wireless sensor, as shown in figure 5, the credible wireless sensing
The control method of device, specifically comprises the following steps:
Step S1:The hardware sequence number and program data for obtaining target object to be verified, according to hardware sequence number and program
Data calculate the metric of target object to be verified, and metric is compared with preset value, and are generated and controlled according to comparison result
System instruction.Target object to be verified is the modules and program number for implementing credible wireless sensor in 1 in the embodiment of the present invention
According to, detailed process can creditable calculation modules are realized in corresponding embodiment 1 function, do not repeating here.
Step S2:Control instruction is obtained, enabled instruction is generated according to control instruction.In the embodiment of the present invention, according to control
Instruction generate enabled instruction detailed process can processing and control module is realized in corresponding embodiment 1 function, do not repeating here.
Step S3:Sensing data is obtained according to enabled instruction, and by constituting between multiple credible wireless sensors
Sensor network transmission sensing data.In the embodiment of the present invention, sensing data is obtained and by multiple credible wireless sensors
Between the detailed process of sensor network transmission sensing data that constitutes processing and control module, data can adopt in corresponding embodiment 1
Collect module, the function that wireless communication module is realized, is not repeating here.
Credible wireless sensor control method provided in an embodiment of the present invention, by the measurement for measuring modules software and hardware
Value just carries out the steps such as subsequent wireless sensing data sampling and processing and transmission when metric is consistent with corresponding preset value
Suddenly, it in the case where the soft hardware integrality that ensure that wireless sensor is realized to wireless sensor ontological security, effectively prevent
The information of wireless sensor network is monitored or transmits dummy message, and heavily fortified point has been established to build safe and reliable wireless sensor network
Real basis.
Obviously, the above embodiments are merely examples for clarifying the description, and does not limit the embodiments.It is right
For those of ordinary skill in the art, can also make on the basis of the above description it is other it is various forms of variation or
It changes.There is no necessity and possibility to exhaust all the enbodiments.And it is extended from this it is obvious variation or
It changes still within the protection scope of the invention.
Claims (10)
1. a kind of credible wireless sensor, which is characterized in that including:Creditable calculation modules, processing and control module, data acquisition module
Block, wireless communication module, wherein:
The creditable calculation modules obtain processing and control module, data acquisition module, the respective hardware sequence of wireless communication module
Number and the processing and control module in program data, calculate the data according to the hardware sequence number and described program data
The metric of acquisition module, wireless communication module, processing and control module and processing and control module Program, by the metric
It is compared with preset value, and control instruction is generated according to comparison result;
The processing and control module receives the control instruction that the creditable calculation modules are sent, and is opened according to control instruction generation
Dynamic instruction, to start the data acquisition module and wireless communication module;
The data collecting module collected sensing data, and the sensing data is sent to the processing and control module;
The biography that the processing and control module is made up of the wireless communication module between multiple credible wireless sensors
Sensing data described in sensor network transmission.
2. credible wireless sensor according to claim 1, which is characterized in that the creditable calculation modules, including:
Cryptography Attendant sub-module, it is respective for obtaining the processing and control module, data acquisition module, wireless communication module
Program data in hardware sequence number and the acquisition processing and control module, and hardware degree is generated according to the hardware sequence number
Magnitude carries out Hash calculation to described program data and obtains program metric;
Integrality stores and measures submodule, for presetting the hardware metric and the metric of program with corresponding respectively
Value is compared, and generates the control instruction according to comparison result.
3. credible wireless sensor according to claim 2, which is characterized in that the integrality storage and measurement submodule
It is specifically used for:
The first program data in the processing and control module is measured to obtain the first program metric and is preset with first
Value is compared, to the processing and control module, data acquisition module, the respective hardware sequence number degree of progress of wireless communication module
It measures hardware metric and is compared with the second preset value;
When consistent and hardware metric is consistent with the second preset value with first preset value for the first program metric,
Generate the control instruction.
4. credible wireless sensor according to claim 2, which is characterized in that the creditable calculation modules further include:It is flat
Platform data protection submodule, for storing the hardware metric and program metric.
5. credible wireless sensor according to claim 2, which is characterized in that the creditable calculation modules further include:Body
Part labeling submodule, for providing identity key, the creditable calculation modules adopt data according to the requirement of communication protocol
Collect module and carry out authentication, after being verified, the processing and control module receives the number that the data acquisition module is sent
According to and handled.
6. credible wireless sensor according to claim 1, which is characterized in that the processing and control module includes:It is volatile
Property memory, nonvolatile memory and microcontroller,
The microcontroller judges the sensing data that the data acquisition module is sent whether is received in preset time;
If the microcontroller does not receive the sensing data that the data acquisition module is sent, the microcontroller in preset time
Device generates dormancy instruction, and the creditable calculation modules is driven to carry out trust computing;
The creditable calculation modules calculate the metric of the second program in the volatile memory, and store second journey
The metric of sequence;
The microcontroller stores second program to the nonvolatile memory, and makes institute according to the dormancy instruction
It states data acquisition module and enters dormant state.
7. credible wireless sensor according to claim 6, which is characterized in that
The data acquisition module receives the wake-up instruction that microprocessor is sent;
The creditable calculation modules extract second program from the nonvolatile memory and carry out trust computing, described in judgement
Whether the metric of the second program is consistent with third preset value;
If the metric of second program is consistent with third preset value, the creditable calculation modules are fed back to the microprocessor
Trust computing successful result;
The microprocessor according to the trust computing successful result by second program load to the volatile memory,
And wake up the data acquisition module.
8. credible wireless sensor according to claim 7, which is characterized in that if the metric of second program and
Three preset values are inconsistent, and the creditable calculation modules feed back trust computing failure result to the microprocessor;The microprocessor
Device resets the data acquisition module according to the trust computing failure result.
9. credible wireless sensor according to claim 1, which is characterized in that further include:Energy supply module, the energy
Amount supply module provides power supply for the creditable calculation modules, processing and control module, data acquisition module and wireless communication module.
10. a kind of control method of credible wireless sensor, which is characterized in that include the following steps:
The hardware sequence number and program data for obtaining target object to be verified, according to the hardware sequence number and described program data
The metric for calculating the target object to be verified, the metric is compared with preset value, and is given birth to according to comparison result
At control instruction;
The control instruction is obtained, enabled instruction is generated according to the control instruction;
Sensing data, and the sensing by being constituted between multiple credible wireless sensors are obtained according to the enabled instruction
Sensing data described in device network transmission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810398711.7A CN108683492B (en) | 2018-04-28 | 2018-04-28 | Credible wireless sensor and control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810398711.7A CN108683492B (en) | 2018-04-28 | 2018-04-28 | Credible wireless sensor and control method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108683492A true CN108683492A (en) | 2018-10-19 |
CN108683492B CN108683492B (en) | 2021-09-03 |
Family
ID=63802672
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810398711.7A Active CN108683492B (en) | 2018-04-28 | 2018-04-28 | Credible wireless sensor and control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108683492B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232417A (en) * | 2007-01-25 | 2008-07-30 | 上海研祥智能科技有限公司 | Embedded type wireless sensing network intelligent platform |
CN101945385A (en) * | 2010-09-10 | 2011-01-12 | 华南农业大学 | Credible wireless sensor network node and control method thereof |
US20110320823A1 (en) * | 2010-06-25 | 2011-12-29 | Microsoft Corporation | Trusted sensors |
CN103136485A (en) * | 2011-11-28 | 2013-06-05 | 联想(北京)有限公司 | Method of realizing computer safety and computer |
CN103716797A (en) * | 2009-03-06 | 2014-04-09 | 交互数字专利控股公司 | Platform validation and management of wireless devices |
CN105608386A (en) * | 2016-03-11 | 2016-05-25 | 成都三零嘉微电子有限公司 | Trusted computing terminal integrity measuring and proving method and device |
CN106575345A (en) * | 2014-09-23 | 2017-04-19 | 英特尔公司 | Technologies for verifying components |
CN107680636A (en) * | 2016-08-02 | 2018-02-09 | 四川智康科技有限责任公司 | A kind of clinical information processing system and method based on metadata |
CN107851162A (en) * | 2015-07-20 | 2018-03-27 | 英特尔公司 | For carrying out the technology of safe programming to safe I/O cipher engine |
CN107851150A (en) * | 2015-07-20 | 2018-03-27 | 英特尔公司 | The technology that secure hardware and software for credible I/O prove |
-
2018
- 2018-04-28 CN CN201810398711.7A patent/CN108683492B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101232417A (en) * | 2007-01-25 | 2008-07-30 | 上海研祥智能科技有限公司 | Embedded type wireless sensing network intelligent platform |
CN103716797A (en) * | 2009-03-06 | 2014-04-09 | 交互数字专利控股公司 | Platform validation and management of wireless devices |
US20110320823A1 (en) * | 2010-06-25 | 2011-12-29 | Microsoft Corporation | Trusted sensors |
CN101945385A (en) * | 2010-09-10 | 2011-01-12 | 华南农业大学 | Credible wireless sensor network node and control method thereof |
CN103136485A (en) * | 2011-11-28 | 2013-06-05 | 联想(北京)有限公司 | Method of realizing computer safety and computer |
CN106575345A (en) * | 2014-09-23 | 2017-04-19 | 英特尔公司 | Technologies for verifying components |
CN107851162A (en) * | 2015-07-20 | 2018-03-27 | 英特尔公司 | For carrying out the technology of safe programming to safe I/O cipher engine |
CN107851150A (en) * | 2015-07-20 | 2018-03-27 | 英特尔公司 | The technology that secure hardware and software for credible I/O prove |
CN105608386A (en) * | 2016-03-11 | 2016-05-25 | 成都三零嘉微电子有限公司 | Trusted computing terminal integrity measuring and proving method and device |
CN107680636A (en) * | 2016-08-02 | 2018-02-09 | 四川智康科技有限责任公司 | A kind of clinical information processing system and method based on metadata |
Also Published As
Publication number | Publication date |
---|---|
CN108683492B (en) | 2021-09-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7302252B2 (en) | Authentication systems, wireless communication terminals, and wireless base stations | |
He et al. | A novel and lightweight system to secure wireless medical sensor networks | |
CN101753312B (en) | Security certification method and security certification device for power grid equipment and negative control terminal | |
Zhou et al. | Security/privacy of wearable fitness tracking IoT devices | |
Malasri et al. | Addressing security in medical sensor networks | |
He et al. | Lightweight and confidential data discovery and dissemination for wireless body area networks | |
CN108900530A (en) | A kind of safe communication system and method | |
CN102685740B (en) | A kind of short-distance wireless communication node and wireless communications method | |
JP2013502156A (en) | Method and apparatus for deriving, communicating and / or verifying ownership of an expression | |
JP2007089156A (en) | Message transmitting method | |
CN103250440A (en) | Privacy control for wireless devices | |
CN103795541B (en) | Secure communication method of electricity information acquisition system of 230M wireless private network channel | |
US9237010B2 (en) | Secure transmission of a message | |
CN113595744B (en) | Network access method, device, electronic equipment and storage medium | |
Mehic et al. | LoRaWAN end nodes: security and energy efficiency analysis | |
CN103560998A (en) | Method and system for wireless sensor network to resist DoS attacks | |
US20210336781A1 (en) | Network device, method for security and computer readable storage medium | |
KR20090059573A (en) | Entity authentication method and key management method in usn, and recording medium storing program including the same | |
CN104994085A (en) | Identity authentication method and system in wireless sensor network | |
CN108683492A (en) | A kind of credible wireless sensor and control method | |
CN113286302A (en) | Node identity authentication scheme based on block chain for worm detection of wireless sensor network | |
CN110278077B (en) | Method, device, equipment and storage medium for acquiring data information of electric energy meter | |
WO2014148960A1 (en) | Communication apparatus, control method thereof, and computer program thereof | |
CN203352621U (en) | Wireless Internet of Things data safety intelligent transmission system | |
CN105072113B (en) | A kind of wireless sensor network security guard method based on data packet dynamic encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |