Disclosure of Invention
Therefore, the invention provides a trusted wireless sensor network architecture and a control method, which can ensure the integrity of software and hardware of a wireless sensor and solve the problem that the information of the wireless sensor network is monitored or false information is transmitted.
The embodiment of the invention provides a credible wireless sensor, which comprises: trusted computing module, processing control module, data acquisition module, wireless communication module, wherein: the trusted computing module acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module, computes metric values of the program data in the data acquisition module, the wireless communication module, the processing control module and the processing control module according to the hardware serial numbers and the program data, compares the metric values with a preset value, and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the processing control module transmits the sensing data through a sensor network formed by the wireless communication module among the plurality of trusted wireless sensors.
Further, the trusted computing module comprises: the cryptography service submodule is used for acquiring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module, acquiring program data in the processing control module, generating a hardware metric value according to the hardware serial numbers, and performing hash calculation on the program data to obtain a program metric value; and the integrity storage and measurement submodule is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating the control instruction according to a comparison result.
Further, the integrity storage and measurement submodule is specifically configured to: measuring first program data in the processing control module to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring respective hardware serial numbers of the processing control module, the data acquisition module and the wireless communication module to obtain a hardware metric value, and comparing the hardware metric value with a second preset value; and when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value, generating the control instruction.
Further, the process control module includes: the microprocessor judges whether the sensing data sent by the data acquisition module is received within preset time; if the microprocessor does not receive the sensing data sent by the data acquisition module within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module to perform trusted computing; the trusted computing module calculates a program metric value of a second program in the volatile memory and stores the program metric value of the second program;
and the microprocessor stores the second program into the nonvolatile memory and enables the data acquisition module to enter a sleep state according to the sleep instruction.
Further, the data acquisition module receives a wake-up instruction sent by the microprocessor; the trusted computing module extracts the second program from the nonvolatile memory to perform trusted computing, and judges whether a program metric value of the second program is consistent with a third preset value; if the program metric value of the second program is consistent with a third preset value, the trusted computing module feeds back a trusted computing success result to the microprocessor; and the microprocessor loads the second program to the volatile memory according to the trusted computing success result and wakes up the data acquisition module.
Further, if the program metric value of the second program is inconsistent with a third preset value, the trusted computing module feeds back a trusted computing failure result to the microprocessor; and the microprocessor resets the data acquisition module according to the trusted computing failure result.
Further, the trusted computing module further comprises: and the platform data protection sub-module is used for storing the hardware metric value and the program metric value.
Further, the trusted computing module further comprises: and the identity identification submodule is used for providing an identity identification key, the trusted computing module carries out identity verification on the data acquisition module according to the requirements of a communication protocol, and the processing control module receives and processes the data sent by the data acquisition module after the verification is passed.
Further, the trusted wireless sensor further comprises: and the energy supply module is used for providing power for the trusted computing module, the processing control module, the data acquisition module and the wireless communication module.
The embodiment of the invention also provides a control method of the credible wireless sensor, which comprises the following steps: acquiring a hardware serial number and program data of a target object to be verified, calculating a metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control instruction according to a comparison result; acquiring the control instruction, and generating a starting instruction according to the control instruction; and acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of trusted wireless sensors.
The technical scheme of the invention has the following advantages:
the embodiment of the invention provides a trusted wireless sensor and a control method, wherein a trusted computing module of the trusted wireless sensor acquires respective hardware serial numbers of a processing control module, a data acquisition module and a wireless communication module and program data in the processing control module to compute a metric value, compares the metric value with a preset value and generates a control instruction according to a comparison result; the processing control module receives a control instruction sent by the trusted computing module and generates a starting instruction according to the control instruction so as to start the data acquisition module and the wireless communication module; the data acquisition module acquires sensing data and sends the sensing data to the processing control module; the wireless communication module transmits sensing data in a sensor network formed among a plurality of credible wireless sensors. According to the trusted wireless sensor and the control method provided by the invention, trusted calculation is carried out before the wireless sensor is used for data transmission, and data transmission is carried out under the condition that the wireless sensor is determined to be trusted, so that the software and hardware integrity of the wireless sensor can be protected, the security of a wireless sensor body is enhanced, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
An embodiment of the present invention provides a trusted wireless sensor, as shown in fig. 1, the trusted wireless sensor includes: the device comprises a trusted computing module 1, a processing control module 2, a data acquisition module 3 and a wireless communication module 4.
Optionally, in some embodiments of the present invention, a plurality of trusted wireless sensors may establish communication connection through the wireless communication module 4, thereby constructing a wireless transmission network. When a trusted wireless sensor in the wireless transmission network needs to work, firstly, the trusted computing module 1 acquires the hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and program data of the processing control module 2, computes the program metric values of the processing control module 2, the data acquisition module 3, the wireless communication module 4 and the processing control module 2 according to the hardware serial numbers and the program data, compares the metric values with preset values, and generates a control instruction according to the comparison result. In a preferred embodiment, as shown in fig. 2, the trusted computing module 1 comprises:
and the cryptography service sub-module 11 is configured to acquire respective hardware serial numbers of the processing control module 2, the data acquisition module 3, and the wireless communication module 4, acquire program data in the processing control module 2, generate a hardware metric value according to the hardware serial numbers, and perform hash calculation on the program data to obtain the program metric value. In a preferred embodiment, the cryptography service sub-module 11 can also provide encryption and public key cryptography for data to ensure the security and reliability of the data.
And the platform data protection sub-module 12 is used for storing the hardware metric value and the program metric value. In the embodiment of the present invention, the platform data protection sub-module 12 includes a Platform Configuration Register (PCR) for storing the metric value of the metric object.
And the integrity storage and measurement submodule 13 is used for comparing the hardware measurement value and the program measurement value with corresponding preset values respectively and generating a control instruction according to the comparison result. In the embodiment of the invention, the integrity storage and measurement sub-module 13 stores the integrity preset value of each measurement object, integrity measurement is carried out on the hardware of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 and the program in the processing control module 2, the trusted computing module 1 judges the integrity of the software and the hardware of the trusted wireless sensor according to the comparison of the preset value and the measurement value, and can send instructions of starting, resetting, recovering and the like to the processing control module according to the judgment result, thereby carrying out safety protection.
In a preferred embodiment, the integrity storage and measurement submodule 13 is specifically configured to: measuring first program data in the processing control module 2 to obtain a first program metric value, comparing the first program metric value with a first preset value, measuring hardware serial numbers of the processing control module 2, the data acquisition module 3 and the wireless communication module 4 to obtain a hardware metric value, and comparing the hardware metric value with a second preset value;
and generating a control instruction when the first program metric value is consistent with the first preset value and the hardware metric value is consistent with the second preset value. In the embodiment of the invention, when the measurement value of the program measurement value hardware is consistent with the corresponding preset value, the software and the hardware of the trusted sensor are complete and safe, and then a control instruction can be issued to the processing control module 2 to perform subsequent data processing work.
In the embodiment of the present invention, the starting process of the trusted wireless sensor includes: after the trusted wireless sensor is powered on or reset, the trusted computing module 1 performs integrity measurement on a starting program in the processing control module 2, when the starting program is consistent with a preset value, the processing control module 2 loads and runs the starting program, the measurement program in the starting program performs integrity measurement on a main program by using the trusted computing module 1, when the measurement value of the main program is consistent with the preset value, the processing control module 2 loads and runs the main program, and the starting process is ended. In the embodiment of the invention, the hardware serial numbers of all modules are recorded in the starting program, when the serial numbers of all modules are consistent with the preset value, the hardware is complete and reliable, the trusted wireless sensor can be safely started, and the main program uses the hardware with the corresponding serial numbers to perform data processing.
And the identity identification submodule 14 is used for providing an identity identification key and providing the identity identification key, the trusted computing module 1 performs identity authentication on the data acquisition module 3 according to the requirements of the communication protocol, and the processing control module 2 receives and processes the data sent by the data acquisition module 3 after the authentication is passed. In the embodiment of the present invention, the identity identification submodule 14 ensures the security of the acquired data by identifying the identity of the data acquisition module 3, the working principle thereof conforms to the relevant regulations of the national relevant trusted cryptographic module standard, and a person skilled in the art can verify the identity of the data acquisition module 3 according to the prior art.
The processing control module 2 receives the control instruction sent by the trusted computing module 1, and generates a starting instruction according to the control instruction so as to start the data acquisition module 3 and the wireless communication module 4. In the embodiment of the present invention, the processing control module 2 is a core module for executing business calculation and functions, and includes a microprocessor 21, a volatile memory 22, and a nonvolatile memory 23, and can receive a relevant instruction from the trusted computing module 1, and receive the data acquisition module 3 and the wireless communication module 4 for processing according to the needs of an actual application scenario.
The data acquisition module 3 acquires sensing data and sends the sensing data to the processing control module 2; in the embodiment of the present invention, the data acquisition module 3 includes a sensing submodule 31 and an a/D conversion submodule 32, and the sensing submodule 31 converts the acquired data into a digital signal through the a/D conversion submodule 32, and then sends the digital signal to the processing control module 2.
The processing control module 2 transmits sensing data through a sensor network formed among a plurality of credible wireless sensors through the wireless communication module 4. In the embodiment of the present invention, the wireless communication module includes a wireless transceiver 41 and a network protocol 42, and the wireless transceiver 41 transmits and receives data according to the network protocol 42 and the processing control module 2.
In practical applications, when the trusted wireless sensor is not required to acquire data within a preset time or the processing control module 2 does not receive the sensing data sent by the data acquisition module 3 within a preset time range, the trusted wireless sensor can be dormant, in an embodiment of the present invention, as shown in fig. 3, a dormancy process of the trusted wireless sensor includes:
step S11, the microprocessor 21 judges whether the sensing data sent by the data acquisition module 3 is received within the preset time;
and step S12, if the microprocessor 21 does not receive the sensing data sent by the data acquisition module 3 within the preset time, the microprocessor generates a sleep instruction and drives the trusted computing module 1 to perform trusted computing.
Step S13: the trusted computing module 1 computes a program metric value for the second program in the volatile memory 22 and stores the program metric value for the second program.
Step S14: the microprocessor 21 stores the second program in the nonvolatile memory 23, and causes the data collection module 3 to enter a sleep state according to the sleep instruction.
In practical application, the processing control module 2 wakes up the trusted wireless sensor entering the sleep state periodically according to application needs, or listens to the wireless communication module 4, and wakes up when a trigger event is found, in an embodiment of the present invention, as shown in fig. 4, a wake-up process of the trusted wireless sensor includes:
step S21, the data acquisition module 3 receives the awakening instruction sent by the microprocessor 21;
in step S22, the trusted computing module 1 extracts the second program from the nonvolatile memory 23 for trusted computing, and determines whether the program metric value of the second program is consistent with a third preset value.
In step S23, if the program metric of the second program is consistent with the third preset value, the trusted computing module 1 feeds back a successful result of trusted computing to the microprocessor 21.
And step S24, the microprocessor 21 loads the second program into the volatile memory 22 according to the trusted computing success result and wakes up the data acquisition module 3.
Step S25, if the program metric value of the second program is inconsistent with the third preset value, the trusted computing module 1 feeds back a trusted computing failure result to the microprocessor 21; the microprocessor 21 resets the data acquisition module 3 according to the trusted computing failure result.
In a preferred embodiment, the trusted wireless sensor further comprises: and the energy supply module 5 is used for supplying power to the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4. In the embodiment of the invention, a battery power supply mode is adopted, the standard voltage is 5V, and power supply support is provided for the trusted computing module 1, the processing control module 2, the data acquisition module 3 and the wireless communication module 4.
According to the trusted wireless sensor provided by the embodiment of the invention, the measurement values of the software and the hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent processes of wireless sensing data acquisition, processing, transmission and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
Example 2
An embodiment of the present invention provides a method for controlling a trusted wireless sensor, as shown in fig. 5, the method for controlling a trusted wireless sensor specifically includes the following steps:
and step S1, acquiring the hardware serial number and the program data of the target object to be verified, calculating the metric value of the target object to be verified according to the hardware serial number and the program data, comparing the metric value with a preset value, and generating a control command according to the comparison result. In the embodiment of the present invention, the target object to be verified is each module and program data of the trusted wireless sensor in embodiment 1, and a specific process may correspond to a function implemented by the trusted computing module in embodiment 1, which is not described herein again.
And step S2, acquiring a control instruction and generating a starting instruction according to the control instruction. In this embodiment of the present invention, a specific process of generating the start instruction according to the control instruction may correspond to a function implemented by the processing control module in embodiment 1, which is not described herein again.
And step S3, acquiring sensing data according to the starting instruction, and transmitting the sensing data through a sensor network formed among the plurality of credible wireless sensors. In the embodiment of the present invention, the specific process of acquiring the sensing data and transmitting the sensing data through the sensor network formed among the plurality of trusted wireless sensors may correspond to the functions implemented by the processing control module, the data acquisition module, and the wireless communication module in embodiment 1, and will not be described herein again.
According to the trusted wireless sensor control method provided by the embodiment of the invention, the measurement values of software and hardware of each module are measured, and when the measurement values are consistent with the corresponding preset values, the subsequent steps of wireless sensor data acquisition, processing, sending and the like are carried out, so that the software and hardware integrity of the wireless sensor is ensured, the information of the wireless sensor network is effectively prevented from being monitored or false information is effectively prevented from being transmitted under the condition of realizing the safety of the wireless sensor body, and a solid foundation is laid for constructing a safe and trusted wireless sensor network.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.