CN108683492B - Credible wireless sensor and control method - Google Patents

Credible wireless sensor and control method Download PDF

Info

Publication number
CN108683492B
CN108683492B CN201810398711.7A CN201810398711A CN108683492B CN 108683492 B CN108683492 B CN 108683492B CN 201810398711 A CN201810398711 A CN 201810398711A CN 108683492 B CN108683492 B CN 108683492B
Authority
CN
China
Prior art keywords
module
program
trusted
data acquisition
processing control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810398711.7A
Other languages
Chinese (zh)
Other versions
CN108683492A (en
Inventor
安宁钰
赵保华
王志皓
梁潇
韩兆刚
王树才
吴向东
陈孝明
全江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Hubei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Global Energy Interconnection Research Institute
State Grid Hubei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Global Energy Interconnection Research Institute, State Grid Hubei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201810398711.7A priority Critical patent/CN108683492B/en
Publication of CN108683492A publication Critical patent/CN108683492A/en
Application granted granted Critical
Publication of CN108683492B publication Critical patent/CN108683492B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种可信无线传感器及控制方法,该可信无线传感器的可信计算模块获取处理控制模块、数据采集模块、无线通信模块各自的硬件序列号及处理控制模块中的程序数据计算度量值,将度量值与预设值进行比较,并根据比较结果生成控制指令;处理控制模块接收可信计算模块发送的控制指令,根据控制指令生成启动指令,以启动数据采集模块和无线通信模块;数据采集模块采集传感数据并发送至所述处理控制模块;无线通信模块在多个可信无线传感器之间构成的传感器网络传输传感数据。本发明提供的可信无线传感器及控制方法,可以保护无线传感器的软硬件完整性,实现对无线传感器本体安全的增强,为构建安全可信的无线传感器网络奠定了坚实的基础。

Figure 201810398711

The invention discloses a trusted wireless sensor and a control method. The trusted computing module of the trusted wireless sensor obtains the respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module, and calculates program data in the processing control module. measure value, compare the measure value with the preset value, and generate a control command according to the comparison result; the processing control module receives the control command sent by the trusted computing module, and generates a start command according to the control command to start the data acquisition module and the wireless communication module The data acquisition module collects the sensing data and sends it to the processing control module; the wireless communication module transmits the sensing data in a sensor network formed between a plurality of trusted wireless sensors. The trusted wireless sensor and the control method provided by the invention can protect the software and hardware integrity of the wireless sensor, realize the enhancement of the security of the wireless sensor body, and lay a solid foundation for building a safe and reliable wireless sensor network.

Figure 201810398711

Description

Credible wireless sensor and control method
Technical Field
The invention relates to the field of power communication, in particular to a trusted wireless sensor and a control method.
Background
A Wireless Sensor Network (WSN) is a distributed sensing network whose distal end is a Sensor that can sense and inspect the outside world. The sensors communicate in a wireless mode, so that the network setting is flexible, the position of the equipment can be changed at any time, and a multi-hop self-organizing network is formed in a wireless communication mode. The sensor types in the wireless sensor network mainly comprise sensor nodes, sink nodes and management nodes. The composition and function of the wireless sensor comprise the following four basic units: the device comprises a sensing unit (consisting of a sensor and an analog-digital conversion functional module), a processing unit (consisting of an embedded system, including a CPU, a memory, an embedded operating system and the like), a communication unit (consisting of a wireless communication module) and a power supply part.
Wireless sensor technology has been widely applied in various internet of things scenes including power systems. However, the existing wireless sensor is often designed with consideration of more functional performance requirements and neglects information security protection, and a corresponding security protection verification means is not set for the wireless sensor, so that an attacker may conveniently acquire confidential information of the wireless sensor and modify program codes in the sensing node, for example, the sensing node has a plurality of identity IDs, thereby communicating in the sensor network with a plurality of identities, and in addition, the attacker may also forge or pretend to be a legitimate node to join in the sensing network by acquiring information such as keys and codes stored in the wireless sensor. Once a part of nodes in the sensor network are controlled, an attacker can launch many kinds of attacks, such as monitoring information transmitted in the sensor network, issuing false routing information or transmitting false sensing information to the sensor network, performing denial of service attacks, and the like.
Disclosure of Invention
Therefore, the invention provides a trusted wireless sensor network architecture and a control method, which can ensure the integrity of software and hardware of a wireless sensor and solve the problem that the information of the wireless sensor network is monitored or false information is transmitted.
The embodiment of the invention provides a credible wireless sensor, which comprises: trusted computing module, processing control module, data acquisition module, wireless communication module, wherein: the trusted computing module acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module, computes metric values of the program data in the data acquisition module, the wireless communication module, the processing control module and the processing control module according to the hardware serial numbers and the program data, compares the metric values with a preset value, and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the processing control module transmits the sensing data through a sensor network formed by the wireless communication module among the plurality of trusted wireless sensors.
Further, the trusted computing module comprises: the cryptography service submodule is used for acquiring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module, acquiring program data in the processing control module, generating a hardware metric value according to the hardware serial numbers, and performing hash calculation on the program data to obtain a program metric value; and the integrity storage and measurement submodule is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating the control instruction according to a comparison result.
Further, the integrity storage and measurement submodule is specifically configured to: measuring first program data in the processing control module to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module to obtain a hardware metric value, and comparing the hardware metric value with a second preset value; and when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value, generating the control instruction.
Further, the process control module includes: the microprocessor judges whether the sensing data sent by the data acquisition module is received within preset time; if the microprocessor does not receive the sensing data sent by the data acquisition module within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module to perform trusted computing; the trusted computing module calculates a program metric value of a second program in the volatile memory and stores the program metric value of the second program;
and the microprocessor stores the second program into the nonvolatile memory and enables the data acquisition module to enter a sleep state according to the sleep instruction.
Further, the data acquisition module receives a wake-up instruction sent by the microprocessor; the trusted computing module extracts the second program from the nonvolatile memory to perform trusted computing, and judges whether a program metric value of the second program is consistent with a third preset value; if the program metric value of the second program is consistent with a third preset value, the trusted computing module feeds back a trusted computing success result to the microprocessor; and the microprocessor loads the second program to the volatile memory according to the trusted computing success result and wakes up the data acquisition module.
Further, if the program metric value of the second program is inconsistent with a third preset value, the trusted computing module feeds back a trusted computing failure result to the microprocessor; and the microprocessor resets the data acquisition module according to the trusted computing failure result.
Further, the trusted computing module further comprises: and the platform data protection sub-module is used for storing the hardware metric value and the program metric value.
Further, the trusted computing module further comprises: and the identity identification submodule is used for providing an identity identification key, the trusted computing module carries out identity verification on the data acquisition module according to the requirements of a communication protocol, and the processing control module receives and processes the data sent by the data acquisition module after the verification is passed.
Further, the trusted wireless sensor further comprises: and the energy supply module is used for providing power for the trusted computing module, the processing control module, the data acquisition module and the wireless communication module.
The embodiment of the invention also provides a control method of the credible wireless sensor, which comprises the following steps: acquiring a hardware serial number and program data of a target object to be verified, calculating a metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control instruction according to a comparison result; acquiring the control instruction, and generating a starting instruction according to the control instruction; and acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of trusted wireless sensors.
The technical scheme of the invention has the following advantages:
the embodiment of the invention provides a trusted wireless sensor and a control method, wherein a trusted computing module of the trusted wireless sensor acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module to compute a metric value, compares the metric value with a preset value and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the wireless communication module transmits sensing data in a sensor network formed among a plurality of credible wireless sensors. According to the trusted wireless sensor and the control method provided by the invention, trusted calculation is carried out before the wireless sensor is used for data transmission, and data transmission is carried out under the condition that the wireless sensor is determined to be trusted, so that the software and hardware integrity of the wireless sensor can be protected, the security of a wireless sensor body is enhanced, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a composition diagram of a specific example of a trusted wireless sensor provided in an embodiment of the present invention;
FIG. 2 is a block diagram of another specific example of a trusted wireless sensor provided in an embodiment of the present invention;
FIG. 3 is a sleep flow diagram for providing a trusted wireless sensor in an embodiment of the present invention;
FIG. 4 is a wake-up flow diagram for providing a trusted wireless sensor in an embodiment of the present invention;
fig. 5 is a flowchart of a specific example of a control method for providing a trusted wireless sensor in an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
An embodiment of the present invention provides a trusted wireless sensor, as shown in fig. 1, the trusted wireless sensor includes: the device comprises a trusted computing module 1, a processing control module 2, a data acquisition module 3 and a wireless communication module 4.
Optionally, in some embodiments of the present invention, a plurality of trusted wireless sensors may establish communication connection through the wireless communication module 4, thereby constructing a wireless transmission network. When a trusted wireless sensor in the wireless transmission network needs to work, firstly, the trusted computing module 1 acquires the hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and program data of the processing control module 2, computes the program metric values of the processing control module 2, the data acquisition module 3, the wireless communication module 4 and the processing control module 2 according to the hardware serial numbers and the program data, compares the metric values with preset values, and generates a control instruction according to the comparison result. In a preferred embodiment, as shown in fig. 2, the trusted computing module 1 comprises:
and the cryptography service sub-module 11 is configured to acquire respective hardware serial numbers of the processing control module 2, the data acquisition module 3, and the wireless communication module 4, acquire program data in the processing control module 2, generate a hardware metric value according to the hardware serial numbers, and perform hash calculation on the program data to obtain the program metric value. In a preferred embodiment, the cryptography service sub-module 11 can also provide encryption and public key cryptography for data to ensure the security and reliability of the data.
And the platform data protection sub-module 12 is used for storing the hardware metric value and the program metric value. In the embodiment of the present invention, the platform data protection sub-module 12 includes a Platform Configuration Register (PCR) for storing the metric value of the metric object.
And the integrity storage and measurement submodule 13 is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating a control instruction according to the comparison result. In the embodiment of the invention, the integrity storage and measurement sub-module 13 stores the integrity preset value of each measurement object, integrity measurement is carried out on the hardware of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and the program in the processing control module 2, the trusted computing module 1 judges the integrity of the software and the hardware of the trusted wireless sensor according to the comparison of the preset value and the measurement value, and can send instructions of starting, resetting, recovering and the like to the processing control module according to the judgment result, thereby carrying out safety protection.
In a preferred embodiment, the integrity storage and measurement submodule 13 is specifically configured to: measuring first program data in the processing control module 2 to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 to obtain a hardware metric value, and comparing the hardware metric value with a second preset value;
and generating a control instruction when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value. In the embodiment of the invention, when the measurement value of the program measurement value hardware is consistent with the corresponding preset value, the software and the hardware of the trusted sensor are complete and safe, and then a control instruction can be issued to the processing control module 2 to perform subsequent data processing work.
In the embodiment of the present invention, the starting process of the trusted wireless sensor includes: after the trusted wireless sensor is powered on or reset, the trusted computing module 1 performs integrity measurement on a starting program in the processing control module 2, when the starting program is consistent with a preset value, the processing control module 2 loads and runs the starting program, the measurement program in the starting program performs integrity measurement on a main program by using the trusted computing module 1, when the measurement value of the main program is consistent with the preset value, the processing control module 2 loads and runs the main program, and the starting process is ended. In the embodiment of the invention, the hardware serial numbers of all modules are recorded in the starting program, when the serial numbers of all modules are consistent with the preset value, the hardware is complete and reliable, the trusted wireless sensor can be safely started, and the main program uses the hardware with the corresponding serial numbers to perform data processing.
And the identity identification submodule 14 is used for providing an identity identification key and providing the identity identification key, the trusted computing module 1 performs identity authentication on the data acquisition module 3 according to the requirements of the communication protocol, and the processing control module 2 receives and processes the data sent by the data acquisition module 3 after the authentication is passed. In the embodiment of the present invention, the identity identification submodule 14 ensures the security of the acquired data by identifying the identity of the data acquisition module 3, the working principle thereof conforms to the relevant regulations of the national relevant trusted cryptographic module standard, and a person skilled in the art can verify the identity of the data acquisition module 3 according to the prior art.
The processing control module 2 receives the control instruction sent by the trusted computing module 1, and generates a starting instruction according to the control instruction so as to start the data acquisition module 3 and the wireless communication module 4. In the embodiment of the present invention, the processing control module 2 is a core module for executing business calculation and functions, and includes a microprocessor 21, a volatile memory 22, and a nonvolatile memory 23, and can receive a relevant instruction from the trusted computing module 1, and receive the data acquisition module 3 and the wireless communication module 4 for processing according to the needs of an actual application scenario.
The data acquisition module 3 acquires sensing data and sends the sensing data to the processing control module 2; in the embodiment of the present invention, the data acquisition module 3 includes a sensing submodule 31 and an a/D conversion submodule 32, and the sensing submodule 31 converts the acquired data into a digital signal through the a/D conversion submodule 32, and then sends the digital signal to the processing control module 2.
The processing control module 2 transmits sensing data through a sensor network formed among a plurality of credible wireless sensors through the wireless communication module 4. In the embodiment of the present invention, the wireless communication module includes a wireless transceiver 41 and a network protocol 42, and the wireless transceiver 41 transmits and receives data according to the network protocol 42 and the processing control module 2.
In practical applications, when the trusted wireless sensor is not required to acquire data within a preset time or the processing control module 2 does not receive the sensing data sent by the data acquisition module 3 within a preset time range, the trusted wireless sensor can be dormant, in an embodiment of the present invention, as shown in fig. 3, a dormancy process of the trusted wireless sensor includes:
step S11, the microprocessor 21 judges whether the sensing data sent by the data acquisition module 3 is received within the preset time;
and step S12, if the microprocessor 21 does not receive the sensing data sent by the data acquisition module 3 within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module 1 to perform trusted computing.
Step S13: the trusted computing module 1 computes a program metric value for the second program in the volatile memory 22 and stores the program metric value for the second program.
Step S14: the microprocessor 21 stores the second program in the nonvolatile memory 23, and causes the data collection module 3 to enter a sleep state according to the sleep instruction.
In practical application, the processing control module 2 wakes up the trusted wireless sensor entering the sleep state periodically according to application needs, or listens to the wireless communication module 4, and wakes up when a trigger event is found, in an embodiment of the present invention, as shown in fig. 4, a wake-up process of the trusted wireless sensor includes:
step S21, the data acquisition module 3 receives the awakening instruction sent by the microprocessor 21;
in step S22, the trusted computing module 1 extracts the second program from the nonvolatile memory 23 for trusted computing, and determines whether the program metric value of the second program is consistent with a third preset value.
In step S23, if the program metric of the second program is consistent with the third preset value, the trusted computing module 1 feeds back a successful result of trusted computing to the microprocessor 21.
And step S24, the microprocessor 21 loads the second program into the volatile memory 22 according to the trusted computing success result and wakes up the data acquisition module 3.
Step S25, if the program metric value of the second program is inconsistent with the third preset value, the trusted computing module 1 feeds back a trusted computing failure result to the microprocessor 21; the microprocessor 21 resets the data acquisition module 3 according to the trusted computing failure result.
In a preferred embodiment, the trusted wireless sensor further comprises: and the energy supply module 5 is used for supplying power to the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4. In the embodiment of the invention, a battery power supply mode is adopted, the standard voltage is 5V, and power supply support is provided for the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4.
According to the trusted wireless sensor provided by the embodiment of the invention, the measurement values of the software and the hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent processes of wireless sensing data acquisition, processing, transmission and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Example 2
An embodiment of the present invention provides a method for controlling a trusted wireless sensor, as shown in fig. 5, the method for controlling a trusted wireless sensor specifically includes the following steps:
and step S1, acquiring the hardware serial number and the program data of the target object to be verified, calculating the metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control command according to the comparison result. In the embodiment of the present invention, the target object to be verified is each module and program data of the trusted wireless sensor in embodiment 1, and a specific process may correspond to a function implemented by the trusted computing module in embodiment 1, which is not described herein again.
And step S2, acquiring a control instruction and generating a starting instruction according to the control instruction. In this embodiment of the present invention, a specific process of generating the start instruction according to the control instruction may correspond to a function implemented by the processing control module in embodiment 1, which is not described herein again.
And step S3, acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of credible wireless sensors. In the embodiment of the present invention, the specific process of acquiring the sensing data and transmitting the sensing data through the sensor network formed among the plurality of trusted wireless sensors may correspond to the functions implemented by the processing control module, the data acquisition module, and the wireless communication module in embodiment 1, and will not be described herein again.
According to the trusted wireless sensor control method provided by the embodiment of the invention, the measurement values of software and hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent steps of wireless sensor data acquisition, processing, sending and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.

Claims (7)

1.一种可信无线传感器,其特征在于,包括:可信计算模块、处理控制模块、数据采集模块、无线通信模块,其中:1. a credible wireless sensor, is characterized in that, comprises: credible computing module, processing control module, data acquisition module, wireless communication module, wherein: 所述可信计算模块获取处理控制模块、数据采集模块、无线通信模块各自的硬件序列号及所述处理控制模块中的程序数据,根据所述硬件序列号计算所述数据采集模块、无线通信模块、处理控制模块的硬件度量值,以及根据所述程序数据计算处理控制模块中程序数据的程序度量值,将所述硬件度量值及程序度量值与预设值进行比较,并根据比较结果生成控制指令;The trusted computing module obtains the respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module and the program data in the processing control module, and calculates the data acquisition module and the wireless communication module according to the hardware serial numbers. , process the hardware metric value of the control module, and calculate the program metric value of the program data in the processing control module according to the program data, compare the hardware metric value and the program metric value with the preset value, and generate control according to the comparison result instruction; 所述处理控制模块接收所述可信计算模块发送的控制指令,根据所述控制指令生成启动指令,以启动所述数据采集模块和无线通信模块;The processing control module receives a control instruction sent by the trusted computing module, and generates an activation instruction according to the control instruction to activate the data acquisition module and the wireless communication module; 所述数据采集模块采集传感数据,并将所述传感数据发送至所述处理控制模块;The data acquisition module collects sensor data, and sends the sensor data to the processing control module; 所述处理控制模块通过所述无线通信模块在多个所述可信无线传感器之间构成的传感器网络传输所述传感数据;The processing control module transmits the sensing data through the wireless communication module in a sensor network formed between a plurality of the trusted wireless sensors; 所述处理控制模块包括:易失性存储器、非易失性存储器及微处理器,The processing control module includes: a volatile memory, a non-volatile memory and a microprocessor, 所述微处理器判断在预设时间内是否收到所述数据采集模块发送的传感数据;The microprocessor determines whether the sensing data sent by the data acquisition module is received within a preset time; 若所述微处理器在预设时间内未收到所述数据采集模块发送的传感数据,所述微处理器生成休眠指令,并驱动所述可信计算模块进行可信计算;If the microprocessor does not receive the sensing data sent by the data acquisition module within a preset time, the microprocessor generates a sleep instruction and drives the trusted computing module to perform trusted computing; 所述可信计算模块计算所述易失性存储器中的第二程序的程序度量值,并存储所述第二程序的程序度量值;The trusted computing module calculates the program metric value of the second program in the volatile memory, and stores the program metric value of the second program; 所述微处理器将所述第二程序存储至所述非易失性存储器,并根据所述休眠指令使所述数据采集模块进入休眠状态;The microprocessor stores the second program in the non-volatile memory, and makes the data acquisition module enter a sleep state according to the sleep instruction; 所述数据采集模块接收微处理器发送的唤醒指令;The data acquisition module receives the wake-up instruction sent by the microprocessor; 所述可信计算模块从所述非易失性存储器提取所述第二程序进行可信计算,判断所述第二程序的程序度量值是否与第三预设值一致;The trusted computing module extracts the second program from the non-volatile memory to perform trusted computing, and judges whether the program metric value of the second program is consistent with a third preset value; 若所述第二程序的程序度量值与第三预设值一致,所述可信计算模块向所述微处理器反馈可信计算成功结果;If the program metric value of the second program is consistent with the third preset value, the trusted computing module feeds back a successful trusted computing result to the microprocessor; 所述微处理器根据所述可信计算成功结果将所述第二程序装载至所述易失性存储器,并唤醒所述数据采集模块。The microprocessor loads the second program into the volatile memory according to the successful result of the trusted calculation, and wakes up the data acquisition module. 2.根据权利要求1所述的可信无线传感器,其特征在于,所述可信计算模块,包括:2. The trusted wireless sensor according to claim 1, wherein the trusted computing module comprises: 密码学服务子模块,用于获取所述处理控制模块、数据采集模块、无线通信模块各自的硬件序列号以及获取所述处理控制模块中的程序数据,并根据所述硬件序列号生成硬件度量值,对所述程序数据进行哈希计算得到程序度量值;The cryptography service sub-module is used to obtain the respective hardware serial numbers of the processing control module, the data acquisition module, and the wireless communication module, and to obtain program data in the processing control module, and to generate hardware metrics according to the hardware serial numbers. , performing hash calculation on the program data to obtain program metrics; 完整性存储与度量子模块,用于将所述硬件度量值及程序度量值分别与对应的预设值进行比较,并根据比较结果生成所述控制指令。The integrity storage and measurement sub-module is used to compare the hardware measurement value and the program measurement value with corresponding preset values respectively, and generate the control instruction according to the comparison result. 3.根据权利要求2所述的可信无线传感器,其特征在于,所述完整性存储与度量子模块具体用于:3. The trusted wireless sensor according to claim 2, wherein the integrity storage and measurement submodule is specifically used for: 对所述处理控制模块中的第一程序数据进行度量得到第一程序度量值并与第一预设值进行比较,对所述处理控制模块、数据采集模块、无线通信模块各自的硬件序列号进行度量得到硬件度量值并与第二预设值进行比较;Measure the first program data in the processing control module to obtain the first program measurement value and compare it with the first preset value, and perform the respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module. The measurement obtains the hardware measurement value and compares it with the second preset value; 当所述第一程序度量值与所述第一预设值一致、且硬件度量值与第二预设值一致时,生成所述控制指令。The control instruction is generated when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value. 4.根据权利要求2所述的可信无线传感器,其特征在于,所述可信计算模块还包括:平台数据保护子模块,用于存储所述硬件度量值与程序度量值。4 . The trusted wireless sensor according to claim 2 , wherein the trusted computing module further comprises: a platform data protection sub-module for storing the hardware metrics and program metrics. 5 . 5.根据权利要求2所述的可信无线传感器,其特征在于,所述可信计算模块还包括:身份标识子模块,用于提供身份标识密钥,所述可信计算模块根据通信协议的要求对数据采集模块进行身份验证,在验证通过后,所述处理控制模块接收所述数据采集模块发送的数据并进行处理。5. The trusted wireless sensor according to claim 2, wherein the trusted computing module further comprises: an identification sub-module for providing an identification key, the trusted computing module according to the communication protocol It is required to perform identity verification on the data acquisition module, and after the verification is passed, the processing control module receives and processes the data sent by the data acquisition module. 6.根据权利要求1所述的可信无线传感器,其特征在于,若所述第二程序的程序度量值与第三预设值不一致,所述可信计算模块向所述微处理器反馈可信计算失败结果;所述微处理器根据所述可信计算失败结果重置所述数据采集模块。6 . The trusted wireless sensor according to claim 1 , wherein if the program metric value of the second program is inconsistent with the third preset value, the trusted computing module feeds back the available value to the microprocessor. 7 . Trust the calculation failure result; the microprocessor resets the data acquisition module according to the trusted calculation failure result. 7.根据权利要求1所述的可信无线传感器,其特征在于,还包括:能量供应模块,所述能量供应模块为所述可信计算模块、处理控制模块、数据采集模块和无线通信模块提供电源。7. The trusted wireless sensor according to claim 1, further comprising: an energy supply module, the energy supply module provides the trusted computing module, the processing control module, the data acquisition module and the wireless communication module power supply.
CN201810398711.7A 2018-04-28 2018-04-28 Credible wireless sensor and control method Active CN108683492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810398711.7A CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810398711.7A CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Publications (2)

Publication Number Publication Date
CN108683492A CN108683492A (en) 2018-10-19
CN108683492B true CN108683492B (en) 2021-09-03

Family

ID=63802672

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810398711.7A Active CN108683492B (en) 2018-04-28 2018-04-28 Credible wireless sensor and control method

Country Status (1)

Country Link
CN (1) CN108683492B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116319401A (en) * 2023-03-03 2023-06-23 浪潮工业互联网股份有限公司 A method, device and medium for data collection and transmission with high reliability

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232417A (en) * 2007-01-25 2008-07-30 上海研祥智能科技有限公司 Embedded type wireless sensing network intelligent platform
CN101945385A (en) * 2010-09-10 2011-01-12 华南农业大学 Credible wireless sensor network node and control method thereof
CN103136485A (en) * 2011-11-28 2013-06-05 联想(北京)有限公司 Method of realizing computer safety and computer
CN103716797A (en) * 2009-03-06 2014-04-09 交互数字专利控股公司 Platform validation and management of wireless devices
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN106575345A (en) * 2014-09-23 2017-04-19 英特尔公司 Technologies for verifying components
CN107680636A (en) * 2016-08-02 2018-02-09 四川智康科技有限责任公司 A clinical information processing system and method based on metadata
CN107851150A (en) * 2015-07-20 2018-03-27 英特尔公司 The technology that secure hardware and software for credible I/O prove

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8832461B2 (en) * 2010-06-25 2014-09-09 Microsoft Corporation Trusted sensors
US10303900B2 (en) * 2015-07-20 2019-05-28 Intel Corporation Technologies for secure programming of a cryptographic engine for trusted I/O

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101232417A (en) * 2007-01-25 2008-07-30 上海研祥智能科技有限公司 Embedded type wireless sensing network intelligent platform
CN103716797A (en) * 2009-03-06 2014-04-09 交互数字专利控股公司 Platform validation and management of wireless devices
CN101945385A (en) * 2010-09-10 2011-01-12 华南农业大学 Credible wireless sensor network node and control method thereof
CN103136485A (en) * 2011-11-28 2013-06-05 联想(北京)有限公司 Method of realizing computer safety and computer
CN106575345A (en) * 2014-09-23 2017-04-19 英特尔公司 Technologies for verifying components
CN107851150A (en) * 2015-07-20 2018-03-27 英特尔公司 The technology that secure hardware and software for credible I/O prove
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device
CN107680636A (en) * 2016-08-02 2018-02-09 四川智康科技有限责任公司 A clinical information processing system and method based on metadata

Also Published As

Publication number Publication date
CN108683492A (en) 2018-10-19

Similar Documents

Publication Publication Date Title
CN109903433B (en) Access control system and access control method based on face recognition
US8799652B2 (en) Method for activating a network node
US7302252B2 (en) Authentication systems, wireless communication terminals, and wireless base stations
JP5840138B2 (en) Cryptographically secure authentication device, system and method
US20110010547A1 (en) Server authentication system, server authentication method, and program for server authentication
JP7037655B2 (en) Dongles and methods for providing digital signatures
CN114302389B (en) Authentication and key agreement method, gateway, sensor and electronic equipment
CN107845171B (en) Method and system for unlocking Internet of things intelligent lock by using wearable device
CN111131144B (en) IoT (Internet of things) equipment management method, device, server and storage medium
US20210144130A1 (en) Method for securing communication without management of states
Akram et al. An efficient, secure and trusted channel protocol for avionics wireless networks
CN104303583A (en) System and method for establishing a secure connection in a communication system
KR101080596B1 (en) Apparatus and method for non-interactive key generation and for communication security using the same in wireless networks
CN103152733A (en) Communication method and device
CN108683492B (en) Credible wireless sensor and control method
KR20090059573A (en) Recording medium storing object authentication method in ubiquitous sensor network and program including the same
JP6696727B2 (en) Mobile terminal key system
CN103560998A (en) Method and system for wireless sensor network to resist DoS attacks
CN116368770A (en) Device identity verification method and device, electronic device and computer readable medium
EP3213509B1 (en) Method for verifying positions of a plurality of monitoring devices
KR100932905B1 (en) Sensing data relay apparatus and method, Sensing data management apparatus and method, Sensor network system thereof
CN114362981A (en) Internet of things terminal equipment upgrade method and related equipment
Dalkılıç et al. Strong authentication protocol for identity verification in Internet of Things (IOT)
KR101966929B1 (en) Systme and method for operating digital key using light wavelength
US20090150670A1 (en) Communication node authentication system and method, and communication node authentication program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant