CN108683492A - A kind of credible wireless sensor and control method - Google Patents

A kind of credible wireless sensor and control method Download PDF

Info

Publication number
CN108683492A
CN108683492A CN201810398711.7A CN201810398711A CN108683492A CN 108683492 A CN108683492 A CN 108683492A CN 201810398711 A CN201810398711 A CN 201810398711A CN 108683492 A CN108683492 A CN 108683492A
Authority
CN
China
Prior art keywords
module
metric
program
processing
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810398711.7A
Other languages
Chinese (zh)
Other versions
CN108683492B (en
Inventor
安宁钰
赵保华
王志皓
梁潇
韩兆刚
王树才
吴向东
陈孝明
全江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Hubei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Hubei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Global Energy Interconnection Research Institute, State Grid Hubei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810398711.7A priority Critical patent/CN108683492B/en
Publication of CN108683492A publication Critical patent/CN108683492A/en
Application granted granted Critical
Publication of CN108683492B publication Critical patent/CN108683492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention discloses a kind of credible wireless sensor and control methods, the creditable calculation modules for wireless sensor that this is credible obtain the program data in processing and control module, data acquisition module, the respective hardware sequence number of wireless communication module and processing and control module and calculate metric, metric is compared with preset value, and control instruction is generated according to comparison result;Processing and control module receives the control instruction that creditable calculation modules are sent, and enabled instruction is generated according to control instruction, with log-on data acquisition module and wireless communication module;Data collecting module collected sensing data is simultaneously sent to the processing and control module;The sensor network transmission sensing data that wireless communication module is constituted between multiple credible wireless sensors.Credible wireless sensor and control method provided by the invention can protect the soft hardware integrality of wireless sensor, realize the enhancing to wireless sensor ontological security, and solid foundation has been established to build safe and reliable wireless sensor network.

Description

A kind of credible wireless sensor and control method
Technical field
The present invention relates to field of power communication, and in particular to a kind of credible wireless sensor and control method.
Background technology
Wireless sensor network (Wireless Sensor Networks, WSN) is a kind of distributed sensor, it Tip is the sensor that can perceive and check the external world.Sensor wirelessly communicates, therefore network settings are flexible, Device location can be changed at any time, the multihop self-organizing network that mode is formed by radio communication.Wireless sensor network In sensor type mainly include sensor node, aggregation node and management node.The composition and function packet of wireless sensor Include following four basic units:Sensing unit (being made of sensor and analog-digital conversion function module), processing unit are (by embedded System is constituted, including CPU, memory, embedded OS etc.), communication unit (being made of wireless communication module) and electricity Source part.
Wireless sensor technology has been widely applied in all kinds of scenes of internet of things including electric system.So And existing wireless sensor often considers that functional performance requires more and ignores protecting information safety in design, not Corresponding security protection verification means are set for wireless sensor, attacker may easily obtain the secret of wireless sensor Program code in information, modification sensing node, such as so that sensing node has multiple identity ID, to passed with multiple identity It is communicated in sensor network, in addition, attacker can also be by obtaining the letters such as the key, the code that are stored in wireless sensor Breath, to which forgery or the legitimate node that disguises oneself as are added in sensing network.Once controlling the part section in sensor network After point, attacker can start a variety of attacks, as monitored the information transmitted in sensor network, be sent out into sensor network The routing iinformation of cloth vacation or the heat transfer agent of transmission vacation, progress Denial of Service attack etc..
Invention content
Therefore, a kind of credible wireless sensor network framework of present invention offer and control method, it is ensured that wireless sensing The soft hardware integrality of device solves the problems, such as that the information of wireless sensor network is monitored or transmits dummy message.
A kind of credible wireless sensor provided in an embodiment of the present invention, including:Creditable calculation modules, processing and control module, Data acquisition module, wireless communication module, wherein:The creditable calculation modules obtain processing and control module, data acquisition module, Program data in the respective hardware sequence number of wireless communication module and the processing and control module, according to the hardware sequence number And described program data calculate the data acquisition module, wireless communication module, processing and control module and processing and control module The metric is compared by the metric of Program with preset value, and generates control instruction according to comparison result;The place Reason control module receives the control instruction that the creditable calculation modules are sent, and enabled instruction is generated according to the control instruction, with Start the data acquisition module and wireless communication module;The data collecting module collected sensing data, and by the sensing Data are sent to the processing and control module;The processing and control module is by the wireless communication module multiple described credible The sensor network constituted between wireless sensor transmits the sensing data.
Further, the creditable calculation modules, including:Cryptography Attendant sub-module, for obtaining the processing control Journey in the respective hardware sequence number of module, data acquisition module, wireless communication module and the acquisition processing and control module Ordinal number evidence, and hardware metric is generated according to the hardware sequence number, carrying out Hash calculation to described program data obtains program Metric;Integrality store with measurement submodule, for by the hardware metric and the metric of program respectively with it is corresponding Preset value is compared, and generates the control instruction according to comparison result.
Further, the integrality storage is specifically used for measurement submodule:To in the processing and control module One program data is measured to obtain the first program metric and is compared with the first preset value, and mould is controlled to the processing The respective hardware sequence number of block, data acquisition module, wireless communication module measured to obtain hardware metric and with it is second pre- If value is compared;When the first program metric with first preset value preset by consistent and hardware metric and second When being worth consistent, the control instruction is generated.
Further, the processing and control module includes:Volatile memory, nonvolatile memory and microcontroller, The microcontroller judges the sensing data that the data acquisition module is sent whether is received in preset time;If the micro-control Device processed does not receive the sensing data that the data acquisition module is sent in preset time, and the microcontroller generates suspend mode and refers to It enables, and the creditable calculation modules is driven to carry out trust computing;The creditable calculation modules calculate in the volatile memory The second program metric, and store the metric of second program;
The microcontroller stores second program to the nonvolatile memory, and according to the dormancy instruction The data acquisition module is set to enter dormant state.
Further, the data acquisition module receives the wake-up instruction that microprocessor is sent;The creditable calculation modules Extract second program from the nonvolatile memory and carry out trust computing, judge second program metric whether It is consistent with third preset value;If the metric of second program is consistent with third preset value, the creditable calculation modules are to institute State microprocessor feedback trust computing successful result;The microprocessor is according to the trust computing successful result by described second Program load wakes up the data acquisition module to the volatile memory.
Further, if the metric and third preset value of second program are inconsistent, the creditable calculation modules to The microprocessor feeds back trust computing failure result;The microprocessor is according to described in trust computing failure result resetting Data acquisition module.
Further, the creditable calculation modules further include:Platform data protects submodule, for storing the hardware degree Magnitude and program metric.
Further, the creditable calculation modules further include:Identity submodule, for providing identity key, The creditable calculation modules carry out authentication, after being verified, institute according to the requirement of communication protocol to data acquisition module Processing and control module is stated to receive the data of the data acquisition module transmission and handled.
Further, the credible wireless sensor further includes:Energy supply module, the energy supply module are The creditable calculation modules, processing and control module, data acquisition module and wireless communication module provide power supply.
The embodiment of the present invention also provides a kind of control method of credible wireless sensor, includes the following steps:It obtains to be tested The hardware sequence number and program data for demonstrate,proving target object calculate described to be tested according to the hardware sequence number and described program data The metric for demonstrate,proving target object, the metric is compared with preset value, and generates control instruction according to comparison result;It obtains The control instruction is taken, enabled instruction is generated according to the control instruction;Sensing data is obtained according to the enabled instruction, and is led to It crosses the sensor network constituted between multiple credible wireless sensors and transmits the sensing data.
Technical solution of the present invention has the following advantages that:
A kind of credible wireless sensor and control method provided in an embodiment of the present invention, wireless sensor that this is credible it is credible Computing module obtains processing and control module, data acquisition module, the respective hardware sequence number of wireless communication module and processing control Mould program data in the block calculates metric, and metric is compared with preset value, and generates control according to comparison result and refer to It enables;Processing and control module receives the control instruction that creditable calculation modules are sent, and enabled instruction is generated according to control instruction, to start Data acquisition module and wireless communication module;Data collecting module collected sensing data is simultaneously sent to processing and control module;Wirelessly The sensor network transmission sensing data that communication module is constituted between multiple credible wireless sensors.It is provided by the invention credible Wireless sensor and control method first carry out trust computing before carrying out data transmission using wireless sensor, are determining the nothing In the case of line sensor is believable, just carries out data transmission, therefore, the soft hardware integrality of wireless sensor can be protected, It realizes the enhancing to wireless sensor ontological security, solid base has been established to build safe and reliable wireless sensor network Plinth.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, other drawings may also be obtained based on these drawings.
Fig. 1 is the composition figure of a specific example of the credible wireless sensor provided in the embodiment of the present invention;
Fig. 2 is the composition figure of credible another specific example of wireless sensor provided in the embodiment of the present invention;
Fig. 3 is the suspend mode flow chart for providing credible wireless sensor in the embodiment of the present invention;
Fig. 4 is the wake-up flow chart for providing credible wireless sensor in the embodiment of the present invention;
Fig. 5 sheets are the flow of one specific example of control method for providing credible wireless sensor in inventive embodiments Figure.
Specific implementation mode
Technical scheme of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described implementation Example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill The every other embodiment that personnel are obtained without making creative work, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " first ", " second " are used for description purposes only, and cannot It is interpreted as indicating or implying relative importance.
As long as in addition, technical characteristic involved in invention described below different embodiments non-structure each other It can be combined with each other at conflict.
Embodiment 1
The embodiment of the present invention provides a kind of credible wireless sensor, as shown in Figure 1, the credible wireless sensor includes:It can Believe computing module 1, processing and control module 2, data acquisition module 3, wireless communication module 4.
Optionally, in some embodiments of the invention, multiple credible wireless sensors can pass through the wireless communication module 4 Communication connection is established, to build wireless-transmission network.When the credible wireless sensor in the wireless-transmission network will carry out work When making, first, it is each to obtain processing and control module 2, data acquisition module 3, wireless communication module 4 by the creditable calculation modules 1 From hardware sequence number and processing and control module in 2 program data, according to hardware sequence number and program data calculation processing control The metric of molding block 2,2 Program of data acquisition module 3, wireless communication module 4 and processing and control module, by metric with Preset value is compared, and generates control instruction according to comparison result.In a preferred embodiment, as shown in Fig. 2, the credible meter Calculating module 1 includes:
Cryptography Attendant sub-module 11, for obtaining processing and control module 2, data acquisition module 3, wireless communication module 4 Program data in respective hardware sequence number and acquisition processing and control module 2, and hardware degree is generated according to hardware sequence number Magnitude carries out Hash calculation to program data and obtains program metric.In a preferred embodiment, cryptography Attendant sub-module 11 Encryption, public key cryptography, to ensure the safe and reliable of data can also be provided to data.
Platform data protects submodule 12, for storage hardware metric and program metric.It, should in the embodiment of the present invention It includes platform configuration register (PCR) that platform data, which is protected in submodule 12, can save the metric of measure object.
Integrality store with measurement submodule 13, for by hardware metric and the metric of program respectively with it is corresponding pre- If value is compared, and generates control instruction according to comparison result.In the embodiment of the present invention, integrality storage and measurement submodule Block 13 stores the integrality preset value of each measure object, to processing and control module 2, data processing module 3, wireless communication module 4 hardware and 2 Program of processing and control module carries out integrity measurement, and creditable calculation modules 1 are according to comparison preset value and measurement Value judges the integrality of credible wireless sensor software and hardware, and can send out startup, again to processing and control module according to judgement result The instructions such as set, restore, to carry out security protection.
In a preferred embodiment, integrality storage is specifically used for measurement submodule 13:To in processing and control module 2 First program data is measured to obtain the first program metric and is compared with the first preset value, to processing and control module 2, Data acquisition module 3,4 respective hardware sequence number of wireless communication module are measured to obtain hardware metric and be preset with second Value is compared;
When the first program metric is consistent with the first preset value and hardware metric is consistent with the second preset value, generate Control instruction.In the embodiment of the present invention, when the corresponding preset value of the metric of the metric hardware of program is consistent, explanation The software and hardware complete safety of credible sensor can issue control instruction to processing and control module 2 in next step and subsequently be counted According to processing work.
In embodiments of the present invention, the Booting sequence of credible wireless sensor includes:Credible wireless sensor is added After electricity or resetting, creditable calculation modules 1 carry out integrity measurement to the startup program in processing and control module 2, work as startup program When consistent with preset value, processing and control module 2 loads and runs startup program, and the measuring procedure in startup program utilizes credible meter It calculates module 1 and integrity measurement is carried out to main program, when the metric of main program is consistent with preset value, processing and control module 2 adds Main program is carried and runs, Booting sequence terminates.Record the hardware sequence of modules in the embodiment of the present invention, in startup program Number, when the sequence number of modules is consistent with preset value, illustrate that hardware is completely reliable, credible wireless sensor can open safely Dynamic, main program carries out data processing using the hardware of corresponding sequence number.
Identity submodule 14, for providing identity key, for providing identity key, trust computing mould Block 1 carries out authentication according to the requirement of communication protocol to data acquisition module 3, and after being verified, processing and control module 2 connects It receives the data that data acquisition module 3 is sent and is handled.In the embodiment of the present invention, which passes through identification The identity of data acquisition module 3 ensures the safety of gathered data, and operation principle meets national related credible password module mark Accurate relevant regulations, those skilled in the art can verify the identity of data acquisition module 3 according to the prior art.
Processing and control module 2 receives the control instruction that creditable calculation modules 1 are sent, and generating startup according to control instruction refers to It enables, with log-on data acquisition module 3 and wireless communication module 4.In embodiments of the present invention, processing and control module 2 is to execute industry Business calculates and the nucleus module of function, including microprocessor 21, volatile memory 22, nonvolatile storage 23, can receive and From the dependent instruction of creditable calculation modules 1, reception data processing module 3, radio communication mold are needed according to practical application scene Block 4 is handled.
Data acquisition module 3 acquires sensing data, and sensing data is sent to processing and control module 2;The present invention is implemented In example, data acquisition module 3 includes sensing module 31, A/D conversion modules 32, and the data of acquisition are passed through A/D by sensing module 31 After conversion module 32 converts analog signals into digital signal, it is sent to processing and control module 2.
The sensor network that module 4 is constituted between multiple credible wireless sensors by radio communication of processing and control module 2 Network transmission sensing data.In the embodiment of the present invention, wireless communication module includes wireless transceiver 41 and procotol 42, wirelessly Transceiver 41 carries out transceiving data according to procotol 42 and processing and control module 1.
In practical application, credible wireless sensor gathered data is not needed in preset time, or in preset time model Enclose interior processing and control module 2 be not received by data acquisition module 3 transmission sensing data when, credible sensor can be stopped It sleeps, in the embodiment of the present invention, as shown in figure 3, the suspend mode flow of credible wireless sensor includes:
Step S11:Microcontroller 21 judges the sensing number of the transmission of data acquisition module 1 whether is received in preset time According to;
Step S12:If microcontroller 21 does not receive the sensing data of the transmission of data acquisition module 3 in preset time, micro- Controller generates dormancy instruction, and creditable calculation modules 1 is driven to carry out trust computing.
Step S13:Creditable calculation modules 1 calculate the metric of the second program in volatile memory 22, and store the The metric of two programs.
Step S14:Second program is stored to nonvolatile memory 23, and makes number according to dormancy instruction by microcontroller 21 Enter dormant state according to acquisition module 1.
In practical applications, processing and control module 1 needs the periodically credible wireless biography to entering dormant state according to application Sensor is waken up, or is intercepted to wireless communication module 4, is waken up when discovery has trigger event, the present invention is real It applies in example, as shown in figure 4, the wake-up flow of credible wireless sensor includes:
Step S21:Data acquisition module 1 receives the wake-up instruction that microprocessor 21 is sent;
Step S22:Creditable calculation modules 1 extract the second program from nonvolatile memory 23 and carry out trust computing, judge Whether the metric of the second program is consistent with third preset value.
Step S23:If the metric of the second program creditable calculation modules 1 consistent with third preset value are anti-to microprocessor 21 Present trust computing successful result.
Step S24:Microprocessor 21 according to trust computing successful result by the second program load to volatile memory 22, Wake up data acquisition module 3.
Step S25:If the metric of the second program and third preset value are inconsistent, creditable calculation modules 1 are to microprocessor 21 feedback trust computing failure results;Microprocessor 21 resets data acquisition module 3 according to trust computing failure result.
In a preferred embodiment, above-mentioned credible wireless sensor further includes:Energy supply module 5, energy supply module Power supply is provided for creditable calculation modules 1, processing and control module 2, data acquisition module 3 and wireless communication module 4.The present invention is implemented It is creditable calculation modules 1, processing and control module 2, data acquisition module that battery powered mode, normal voltage 5V are used in example Block 3 and wireless communication module 4 provide power supply and support.
Credible wireless sensor provided in an embodiment of the present invention, by measuring the metric of modules software and hardware, degree of working as When magnitude is consistent with corresponding preset value, the processes such as subsequent wireless sensing data sampling and processing and transmission are just carried out, are being ensured The soft hardware integrality of wireless sensor effectively prevent wireless sensing in the case of realizing to wireless sensor ontological security The information of device network is monitored or transmits dummy message, and solid base has been established to build safe and reliable wireless sensor network Plinth.
Embodiment 2
The embodiment of the present invention provides a kind of control method of credible wireless sensor, as shown in figure 5, the credible wireless sensing The control method of device, specifically comprises the following steps:
Step S1:The hardware sequence number and program data for obtaining target object to be verified, according to hardware sequence number and program Data calculate the metric of target object to be verified, and metric is compared with preset value, and are generated and controlled according to comparison result System instruction.Target object to be verified is the modules and program number for implementing credible wireless sensor in 1 in the embodiment of the present invention According to, detailed process can creditable calculation modules are realized in corresponding embodiment 1 function, do not repeating here.
Step S2:Control instruction is obtained, enabled instruction is generated according to control instruction.In the embodiment of the present invention, according to control Instruction generate enabled instruction detailed process can processing and control module is realized in corresponding embodiment 1 function, do not repeating here.
Step S3:Sensing data is obtained according to enabled instruction, and by constituting between multiple credible wireless sensors Sensor network transmission sensing data.In the embodiment of the present invention, sensing data is obtained and by multiple credible wireless sensors Between the detailed process of sensor network transmission sensing data that constitutes processing and control module, data can adopt in corresponding embodiment 1 Collect module, the function that wireless communication module is realized, is not repeating here.
Credible wireless sensor control method provided in an embodiment of the present invention, by the measurement for measuring modules software and hardware Value just carries out the steps such as subsequent wireless sensing data sampling and processing and transmission when metric is consistent with corresponding preset value Suddenly, it in the case where the soft hardware integrality that ensure that wireless sensor is realized to wireless sensor ontological security, effectively prevent The information of wireless sensor network is monitored or transmits dummy message, and heavily fortified point has been established to build safe and reliable wireless sensor network Real basis.
Obviously, the above embodiments are merely examples for clarifying the description, and does not limit the embodiments.It is right For those of ordinary skill in the art, can also make on the basis of the above description it is other it is various forms of variation or It changes.There is no necessity and possibility to exhaust all the enbodiments.And it is extended from this it is obvious variation or It changes still within the protection scope of the invention.

Claims (10)

1. a kind of credible wireless sensor, which is characterized in that including:Creditable calculation modules, processing and control module, data acquisition module Block, wireless communication module, wherein:
The creditable calculation modules obtain processing and control module, data acquisition module, the respective hardware sequence of wireless communication module Number and the processing and control module in program data, calculate the data according to the hardware sequence number and described program data The metric of acquisition module, wireless communication module, processing and control module and processing and control module Program, by the metric It is compared with preset value, and control instruction is generated according to comparison result;
The processing and control module receives the control instruction that the creditable calculation modules are sent, and is opened according to control instruction generation Dynamic instruction, to start the data acquisition module and wireless communication module;
The data collecting module collected sensing data, and the sensing data is sent to the processing and control module;
The biography that the processing and control module is made up of the wireless communication module between multiple credible wireless sensors Sensing data described in sensor network transmission.
2. credible wireless sensor according to claim 1, which is characterized in that the creditable calculation modules, including:
Cryptography Attendant sub-module, it is respective for obtaining the processing and control module, data acquisition module, wireless communication module Program data in hardware sequence number and the acquisition processing and control module, and hardware degree is generated according to the hardware sequence number Magnitude carries out Hash calculation to described program data and obtains program metric;
Integrality stores and measures submodule, for presetting the hardware metric and the metric of program with corresponding respectively Value is compared, and generates the control instruction according to comparison result.
3. credible wireless sensor according to claim 2, which is characterized in that the integrality storage and measurement submodule It is specifically used for:
The first program data in the processing and control module is measured to obtain the first program metric and is preset with first Value is compared, to the processing and control module, data acquisition module, the respective hardware sequence number degree of progress of wireless communication module It measures hardware metric and is compared with the second preset value;
When consistent and hardware metric is consistent with the second preset value with first preset value for the first program metric, Generate the control instruction.
4. credible wireless sensor according to claim 2, which is characterized in that the creditable calculation modules further include:It is flat Platform data protection submodule, for storing the hardware metric and program metric.
5. credible wireless sensor according to claim 2, which is characterized in that the creditable calculation modules further include:Body Part labeling submodule, for providing identity key, the creditable calculation modules adopt data according to the requirement of communication protocol Collect module and carry out authentication, after being verified, the processing and control module receives the number that the data acquisition module is sent According to and handled.
6. credible wireless sensor according to claim 1, which is characterized in that the processing and control module includes:It is volatile Property memory, nonvolatile memory and microcontroller,
The microcontroller judges the sensing data that the data acquisition module is sent whether is received in preset time;
If the microcontroller does not receive the sensing data that the data acquisition module is sent, the microcontroller in preset time Device generates dormancy instruction, and the creditable calculation modules is driven to carry out trust computing;
The creditable calculation modules calculate the metric of the second program in the volatile memory, and store second journey The metric of sequence;
The microcontroller stores second program to the nonvolatile memory, and makes institute according to the dormancy instruction It states data acquisition module and enters dormant state.
7. credible wireless sensor according to claim 6, which is characterized in that
The data acquisition module receives the wake-up instruction that microprocessor is sent;
The creditable calculation modules extract second program from the nonvolatile memory and carry out trust computing, described in judgement Whether the metric of the second program is consistent with third preset value;
If the metric of second program is consistent with third preset value, the creditable calculation modules are fed back to the microprocessor Trust computing successful result;
The microprocessor according to the trust computing successful result by second program load to the volatile memory, And wake up the data acquisition module.
8. credible wireless sensor according to claim 7, which is characterized in that if the metric of second program and Three preset values are inconsistent, and the creditable calculation modules feed back trust computing failure result to the microprocessor;The microprocessor Device resets the data acquisition module according to the trust computing failure result.
9. credible wireless sensor according to claim 1, which is characterized in that further include:Energy supply module, the energy Amount supply module provides power supply for the creditable calculation modules, processing and control module, data acquisition module and wireless communication module.
10. a kind of control method of credible wireless sensor, which is characterized in that include the following steps:
The hardware sequence number and program data for obtaining target object to be verified, according to the hardware sequence number and described program data The metric for calculating the target object to be verified, the metric is compared with preset value, and is given birth to according to comparison result At control instruction;
The control instruction is obtained, enabled instruction is generated according to the control instruction;
Sensing data, and the sensing by being constituted between multiple credible wireless sensors are obtained according to the enabled instruction Sensing data described in device network transmission.
CN201810398711.7A 2018-04-28 2018-04-28 Credible wireless sensor and control method Active CN108683492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810398711.7A CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810398711.7A CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Publications (2)

Publication Number Publication Date
CN108683492A true CN108683492A (en) 2018-10-19
CN108683492B CN108683492B (en) 2021-09-03

Family

ID=63802672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810398711.7A Active CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Country Status (1)

Country Link
CN (1) CN108683492B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232417A (en) * 2007-01-25 2008-07-30 上海研祥智能科技有限公司 Embedded type wireless sensing network intelligent platform
CN101945385A (en) * 2010-09-10 2011-01-12 华南农业大学 Credible wireless sensor network node and control method thereof
US20110320823A1 (en) * 2010-06-25 2011-12-29 Microsoft Corporation Trusted sensors
CN103136485A (en) * 2011-11-28 2013-06-05 联想(北京)有限公司 Method of realizing computer safety and computer
CN103716797A (en) * 2009-03-06 2014-04-09 交互数字专利控股公司 Platform validation and management of wireless devices
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN106575345A (en) * 2014-09-23 2017-04-19 英特尔公司 Technologies for verifying components
CN107680636A (en) * 2016-08-02 2018-02-09 四川智康科技有限责任公司 A kind of clinical information processing system and method based on metadata
CN107851162A (en) * 2015-07-20 2018-03-27 英特尔公司 For carrying out the technology of safe programming to safe I/O cipher engine
CN107851150A (en) * 2015-07-20 2018-03-27 英特尔公司 The technology that secure hardware and software for credible I/O prove

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232417A (en) * 2007-01-25 2008-07-30 上海研祥智能科技有限公司 Embedded type wireless sensing network intelligent platform
CN103716797A (en) * 2009-03-06 2014-04-09 交互数字专利控股公司 Platform validation and management of wireless devices
US20110320823A1 (en) * 2010-06-25 2011-12-29 Microsoft Corporation Trusted sensors
CN101945385A (en) * 2010-09-10 2011-01-12 华南农业大学 Credible wireless sensor network node and control method thereof
CN103136485A (en) * 2011-11-28 2013-06-05 联想(北京)有限公司 Method of realizing computer safety and computer
CN106575345A (en) * 2014-09-23 2017-04-19 英特尔公司 Technologies for verifying components
CN107851162A (en) * 2015-07-20 2018-03-27 英特尔公司 For carrying out the technology of safe programming to safe I/O cipher engine
CN107851150A (en) * 2015-07-20 2018-03-27 英特尔公司 The technology that secure hardware and software for credible I/O prove
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN107680636A (en) * 2016-08-02 2018-02-09 四川智康科技有限责任公司 A kind of clinical information processing system and method based on metadata

Also Published As

Publication number Publication date
CN108683492B (en) 2021-09-03

Similar Documents

Publication Publication Date Title
US7302252B2 (en) Authentication systems, wireless communication terminals, and wireless base stations
He et al. A novel and lightweight system to secure wireless medical sensor networks
CN101753312B (en) Security certification method and security certification device for power grid equipment and negative control terminal
Zhou et al. Security/privacy of wearable fitness tracking IoT devices
Malasri et al. Addressing security in medical sensor networks
He et al. Lightweight and confidential data discovery and dissemination for wireless body area networks
CN108900530A (en) A kind of safe communication system and method
CN102685740B (en) A kind of short-distance wireless communication node and wireless communications method
JP2013502156A (en) Method and apparatus for deriving, communicating and / or verifying ownership of an expression
JP2007089156A (en) Message transmitting method
CN103250440A (en) Privacy control for wireless devices
CN103795541B (en) Secure communication method of electricity information acquisition system of 230M wireless private network channel
US9237010B2 (en) Secure transmission of a message
CN113595744B (en) Network access method, device, electronic equipment and storage medium
Mehic et al. LoRaWAN end nodes: security and energy efficiency analysis
CN103560998A (en) Method and system for wireless sensor network to resist DoS attacks
US20210336781A1 (en) Network device, method for security and computer readable storage medium
KR20090059573A (en) Entity authentication method and key management method in usn, and recording medium storing program including the same
CN104994085A (en) Identity authentication method and system in wireless sensor network
CN108683492A (en) A kind of credible wireless sensor and control method
CN113286302A (en) Node identity authentication scheme based on block chain for worm detection of wireless sensor network
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
WO2014148960A1 (en) Communication apparatus, control method thereof, and computer program thereof
CN203352621U (en) Wireless Internet of Things data safety intelligent transmission system
CN105072113B (en) A kind of wireless sensor network security guard method based on data packet dynamic encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant