CN108684018A - 5G mMTC aggregation node module construction methods based on block chain - Google Patents

5G mMTC aggregation node module construction methods based on block chain Download PDF

Info

Publication number
CN108684018A
CN108684018A CN201810431213.8A CN201810431213A CN108684018A CN 108684018 A CN108684018 A CN 108684018A CN 201810431213 A CN201810431213 A CN 201810431213A CN 108684018 A CN108684018 A CN 108684018A
Authority
CN
China
Prior art keywords
user
block chain
terminal
convergence
contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810431213.8A
Other languages
Chinese (zh)
Inventor
孙君
熊关
胡欣鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201810431213.8A priority Critical patent/CN108684018A/en
Publication of CN108684018A publication Critical patent/CN108684018A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Abstract

Present invention is disclosed a kind of 5G mMTC aggregation node module construction methods, this method is mainly based upon block chain technology to solve the design of the aggregation node function module in 5G mMTC scenes.For mMTC scenes, tip in single macro cells disposes micro-base station, multiple convergence terminal users of different application scene may be constructed a block chain in the single macro cells of mMTC scenes, and all user terminals of same application scene may be constructed a block chain.And the design construction of convergence terminal, main authentication mechanism including user terminal, convergence terminal Data Encryption Transmission and user terminal monitoring.Using the structural scheme of the present invention, the system user terminal connection quantity of the single macro base station cell in mMTC application scenarios is effectively improved, the connection burden of macro base station is effectively reduced, simultaneously effective ensures the safety of data transmission.

Description

5G mMTC aggregation node module construction methods based on block chain
Technical field
The present invention relates to a kind of detection methods of Network Abnormal, and in particular to a kind of wireless sensor for dense deployment The abnormal deviation data examination method of network.
Background technology
Large-scale machines communicate(mMTC)It is following 5th generation(5G)One of three big application scenarios of wireless network.It should Support the extensive connection of tens billion of low power type machine terminal equipment.In order to cope with this challenge, the following mMTC networks can It can be grouped according to the type of service of user terminal and geographical location, user terminal is divided into different types of user Then set applies non-orthogonal multiple(NOMA)Technology accesses user terminal.Using the method being grouped to user terminal, Network will become double-layer structure.In the user terminal cluster of same type business, some MTC or other types of equipment may The other machine type equipments for playing the part of the role of convergence terminal to coordinate in cluster access network by double jump link.In order to answer Need to accommodate the challenge of a large amount of MTC users to serving cell, the convergence terminal in the scheme of user grouping may be tied in a distributed manner Structure is present in single serving cell.With the further development of mMTC, the management of machine type equipment of the following number in terms of hundred billion Huge cost pressure will be brought with safeguarding to manufacturer, operator and end user.
Since mMTC is similar with Internet of Things, naturally there is distributed frame, and current Internet of Things application is substantially all It is that all data flows are all aggregated into single central control system, although with the hair of cloud computing technology and big data technology Exhibition, present Internet of Things network operation business can store and transmit service by the server cluster in high in the clouds offer data.But with The appearance of mMTC application scenarios can cause to connect being skyrocketed through for number of devices, therefore centralization service formula structure needs are paid Calculating, storage and bandwidth cost can also increase greatly can not burden degree, while data volume be skyrocketed through also give server Database bring security risk.Needed for the explosive growth of connection number of devices can carry out data transmission to each cell base station Band resource bring prodigious challenge.
There to be number to access network, and various application distinct devices institute with hundred billion equipment in magnanimity machine type communication scene The data type of transmission is also different.3GPP TS(Technical Specification) 22 368 by the allusion quotation of MTC communication Type sector application is divided into 7 major class and 35 subclasses;Seven major class include:Safety monitoring, cargo tracking, intelligence payment, medical treatment Health care, remote monitoring, intelligent measure, consumer electronics etc..If the MTC device of every class application in a region is required for solely On the spot if the base station of access region, prodigious burden can be brought to base station while the wasting of resources and system can be brought to rush It is prominent.Fortunately the magnanimity access of mMTC systems has unique features, i.e. low-power consumption, sudden, short frame length business.Magnanimity accesses Mainly a large amount of equipment for sending very short packages of solution are expansible, efficiently connect.Similar to the routing mechanism of internet, Network is excessive and entire internet cannot be allowed there was only level-one routing infrastructure.The magnanimity access for solving mMTC is also impossible to only level-one It is directly accessed pattern, and should be the framework of layer-specific access.
Invention content
In consideration of it, the purpose of the present invention is directed to a kind of 5G mMTC aggregation nodes module structure side based on block chain Method solves the problems, such as burden, the wasting of resources and the system crash of base station increase-volume.
Technical solution is used by the present invention solves the above problems:5G mMTC aggregation node modules based on block chain Building method, it is characterised in that including step:
Macro cells are built, in the tip distributed deployment three of single macro base station or more micro-base station,
User terminal is layered, using the coverage area of macro cells as boundary, the type of service according to user terminal and geographical location User grouping is carried out, several different types of user's set are become;
Application scenarios generate, one will surrounded corresponding to the access of user terminal that each user gathers using non-orthogonal multiple technology A micro-base station, and pass through double jump link-access net by other Generic End-Users in convergence terminal user's coordinates user set Network.
Further, each user's set includes that the common of transmission only is encrypted to data in user terminal layering The convergence that terminal user and more than one data for gathering this user interior all Generic End-Users are calculated and managed is whole End subscriber.
Further, during application scenarios generate, the convergence terminal user in each application scenarios forms the first block Chain.
Further, during application scenarios generate, by the Generic End-User and this application scene in single application scenarios In convergence terminal user form second of block chain.
Further, the process of each end-user access network includes the authentication of terminal user during application scenarios generate The monitoring of mechanism, the Data Encryption Transmission of convergence terminal user and terminal user.
Further, the authentication flow of convergence terminal user includes step:
Step11:Convergence terminal user sends registration request, block chain to the block chain network being made of convergence terminal user Return to convergence terminal user's a pair of public key and private key;Wherein address of the public key as convergence terminal user on the block chain, Unique key of the private key as corresponding decryption;
Step12:Convergence terminal user reaches a intelligence about subscription authentication certification with all terminal users on the block chain Energy contract, the terminal user of participation are signed with respective private key respectively;
Step13:Intelligent contract diffuses to each convergence terminal user by way of P2P in the block chain network, and first protects It is stored in terminal user's memory of each participation, waits for common recognition and processing of the common recognition time triggered to the intelligent contract of this part;
Step14:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure and is diffused into the whole network;After other convergence terminal users receive this block structure, include the inside The hash value of contract set extracts, and is compared with the contract set oneself preserved;Oneself a approval is sent simultaneously Contract set give other convergence terminal users;By this transmissions taken turns and compare, all convergence terminal users are advising more Reach an agreement to newest contract set in the fixed time.
Further, the authentication flow of Generic End-User includes step:
Step21:The Generic End-User block chain network that user terminal is constituted in by single application scenarios sends registration and asks It asks, block chain returns to Generic End-User a pair of public key and private key;Wherein public key as Generic End-User in the block chain On address, unique key of the private key as corresponding decryption;
Step22:Generic End-User reaches a intelligence about subscription authentication certification with all terminal users on the block chain Energy contract, the terminal user of participation are signed with respective private key respectively;
Step23:Intelligent contract diffuses to each convergence terminal user by way of P2P in the block chain network, and first protects It is stored in terminal user's memory of each participation, waits for common recognition and processing of the common recognition time triggered to the intelligent contract of this part;
Step24:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure and is diffused into the whole network;After other convergence terminal users receive this block structure, include the inside The hash value of contract set extracts, and is compared with the contract set oneself preserved;Oneself a approval is sent simultaneously Contract set give other convergence terminal users;By this transmissions taken turns and compare more;All convergence terminal users are advising Reach an agreement to newest contract set in the fixed time.
Further, the Data Encryption Transmission flow of convergence terminal user includes step:
Step31:Transmitting side terminal user is encrypted data using the private key of itself, and into entire block chain network into Row broadcast;
Step32:Receiving terminal terminal user is decrypted using corresponding public key to receiving data, and the data information to receiving The legitimacy of transaction is tested, and by covering timestamp after inspection, data information is included into a block;
Step33:All convergence terminal users give the data information received transaction to cover timestamp in entire block chain network, And it is included in block, while to onblock executing common recognition mechanism;
Step34:Block is stored by being formally included in block chain after algorithmic procedure of knowing together, and is owned in entire block chain network Convergence terminal extended based on the block chain with the block, the manufacture of new block is received per family.
Further, the monitoring flow of terminal user includes step:
Step41:Terminal user must first be registered as the user of the block chain, be carried out at the same time authentication;
Step42:It needs all terminal users being monitored to decide through consultation a intelligent contract monitored about user jointly, participates in Terminal user signed respectively using respective private key.
Step43:Intelligent contract is broadcasted in the block chain network by way of P2P, is sent to each terminal use Family, the intelligent contract after signature can be present among block chain network according to content therein in the form of code;In block chain Convergence terminal user the intelligent contract received is first saved in memory, wait for common recognition time triggered to the intelligent contract of this part Common recognition and processing;
Step44:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure, is diffused into the whole network;After other aggregation nodes receive this block structure, the conjunction that include the inside is understood The hash value about gathered extracts, and is compared with the contract set oneself preserved;A conjunction oneself approved is sent simultaneously About gather to other convergence terminal users;By this transmissions taken turns and compare more;All convergence terminal users are defined Reach an agreement to newest contract set in time;Once the data information that terminal user sends simultaneously meets touching for intelligent contract Clockwork spring part, block chain network are automatically processed according to intelligent contract.
Compared with prior art, the present invention has substantive distinguishing features outstanding and significant progress, advantage body It is now:Using the above-mentioned building method of the present invention, the single macro base station cell in mMTC application scenarios can be effectively improved System user terminal connects quantity, is effectively reduced the connection burden of macro base station, simultaneously effective ensures that the data in mMTC pass Defeated safety builds the bridge of the data transmission of low cost between magnanimity smart machine.In addition, by using block chain skill The characteristic of the decentralization of art improves the safety of system and privacy, monitoring of equipment technology are also effectively improved smart machine Safety.
Description of the drawings
Fig. 1 is mMTC layer-specific access frame diagrams.
Fig. 2 is the single macro cells schematic diagram of mMTC scenes.
Fig. 3 is convergence terminal subscription authentication identifying procedure figure.
Fig. 4 is Generic End-User authentication flow chart.
Fig. 5 is convergence terminal user data transmission schematic diagram.
Fig. 6 is convergence terminal ciphering user data transfer process figure.
Fig. 7 is that terminal user monitors flow chart.
Specific implementation mode
Technical scheme of the present invention is described in further detail below in conjunction with the accompanying drawings, the given examples are served only to explain the present invention, It is not intended to limit the scope of the present invention.
Block chain technology is a kind of decentralization, does not depend on third party, carries out network data by itself distributed node Storage, self-authentication, management, encrypted transmission a kind of technical solution.Block chain technology can make up mMTC applications well Aforementioned drawback in scene.Block chain technology can be to provide point-to-point distributed data transport and storage under mMTC networks Framework, mitigate the access burden of center of housing estate base station;Simultaneously under distributed environment, block chain technology provides encryption to data Protection and self-authentication mechanism, while reliable disbursement and sattlement mode can also be provided.It is directed to safety, as long as cannot control The 51% of total data node, can not just manipulate modification network data wantonly, this makes block chain itself become comparatively safe, is avoided Subjective artificial data change.
Network is layered as shown in Figure 1, it is grouped according to the type of service of user terminal and geographical location, User terminal is divided into different types of user's set, then applies non-orthogonal multiple(NOMA)Technology accesses user terminal micro- Base station.In a user terminal user gathers, convergence terminal user carrys out other machine type equipments in coordinates user set Network is accessed by double jump link, convergence terminal structure may be present in single serving cell in a distributed manner.How to improve The system user connection quantity and the data in effective guarantee mMTC of single macro base station cell in entire mMTC application scenarios The safety of transmission, this is particularly important.The present invention proposes a kind of 5G mMTC aggregation node modules based on block chain technology Design method to ensure the safety of data transmission in mMTC, while improving single macro base station cell in mMTC application scenarios System user connects quantity.
The application scenarios of 5G are broadly divided by China IMT-2020 propulsions group:Continuous wide area covering, hot spot high power capacity, low work( The big connection of consumption, low time delay are highly reliable.Low-frequency resources in 5G are mainly used for that continuous wide covering, low time delay is highly reliable, low-power consumption is big The application scenarios such as connection, and the main carriers of low-frequency resources are macro base station.It is main for the hot spot high power capacity scene for being deployed in high frequency Microcellulor is applied, i.e., using micro-base station as base main body.It, can also be single macro for mMTC, the i.e. big connection scene of low-power consumption The tip of cellular cell disposes three or more micro-base stations, is connected in enhanced room, further expands network capacity, mitigate macro base station Connection burden.The single macro cells of mMTC scenes are as shown in Fig. 2, contain eight micro- bases in macro cells in the present embodiment It stands, i.e. eight application scenarios.
According to described hierarchical network before in single macro base station cell in mMTC application scenarios, according to user terminal Type of service and geographical location are grouped it, and user terminal, which is divided into different types of user, to be gathered, then apply it is non-just Hand over multiple access(NOMA)Technology accesses micro-base station to user terminal.In a user terminal user gathers, convergence terminal user comes Other machine type equipments in coordinates user set access network by double jump link, and convergence terminal may be tied in a distributed manner Structure is present in single serving cell.Therefore in a user gathers, several convergence terminals user can be selected, and it is other Terminal user then be used as general subscriber terminal.From allomeric function, only biography is encrypted to data in Generic End-User It is defeated, and convergence terminal user then calculates and manages to the data of Generic End-User, merchandises to it as block chain Its convergence terminal user is transmitted, while convergence terminal user does not preserve data, is only used as the terminal of data transmission, rises The effect of data safety and secret protection is arrived.As shown in Figure 2 it is found that in the single macro base station cell of mMTC scenes, there are two Kind of block chain structure, the first block chain structure being made of the convergence terminal user in each application scenarios are for second The block chain structure being made of the Generic End-User in single application scenarios and the convergence terminal user in the scene.
Design about convergence terminal user constructs, and the present invention mainly proposes the Process Design for accessing network:User is whole The monitoring of the authentication mechanism at end, the Data Encryption Transmission and user terminal of convergence terminal.
One, the authentication mechanism of terminal user.
Pass through the design of the user grouping set to the single macro cells of mMTC application scenarios, it is known that when ordinary terminal is used Family and convergence terminal user will be linked by authentication in corresponding network before carrying out data transmission.Therefore to list For a user's set, the authentication for completing convergence terminal user is first had to, it is made to be linked into block chain network;Secondly general Logical terminal user carries out authentication verification by converging user terminal, it is made to be linked into single user's gathering network.
In block catenary system, the basis of ownership authentication mechanism is rivest, shamir, adelman.In rivest, shamir, adelman In, there are two keys, i.e. public key and private key.If data are encrypted using public key, corresponding private key is only used It can be decrypted;If data are encrypted with private key, only can be just decrypted using corresponding public key.Non- right Claim in cryptographic communication system, each user contains a pair of of public key and private key, but only public key external disclosure, private key only user's sheet Body is held.When being communicated, information source is encrypted using private key, and transmitted information once reaches the stay of two nights, stay of two nights use pair The public key answered is decrypted, this ensures that data could be checked by only receiving both sides.It is asymmetric to add in block catenary system There are two types of the basic usage scenarios of close algorithm:
A)Public key encrypts Transaction Information, and private key decrypts Transaction Information.After private key holder decryption, the friendship received can be used Easy information.
B)Private key is to Information Signature, public key verifications signature.It can be confirmed by the information of public key signature verifications and held for private key What someone was sent out.
Intelligent contract based on block chain encapsulates contract state, the contents such as trigger condition and contract operation.Signature is closed User about reaches consistent with regard to treaty content, is deployed in the form of code on block chain, when external input affairs and event are full When sufficient trigger condition, automatic activation intelligence contract simultaneously executes.By using asymmetric arithmetic and intelligence contract based on block chain Complete subscriber terminal authority certification, specific details are as follows.
The authentication flow of convergence terminal user is as shown in figure 3, include step:
Step11:Convergence terminal user sends registration request, block chain to the block chain network being made of convergence terminal user Return to convergence terminal user's a pair of public key and private key;Wherein address of the public key as convergence terminal user on the block chain, Unique key of the private key as corresponding decryption;
Step12:Convergence terminal user reaches a intelligence about subscription authentication certification with all terminal users on the block chain Energy contract, the terminal user of participation is signed with respective private key respectively, to ensure the validity of contract;
Step13:Intelligent contract diffuses to each convergence terminal user by way of P2P in the block chain network, and first protects It is stored in terminal user's memory of each participation, waits for common recognition and processing of the common recognition time triggered to the intelligent contract of this part;
Step14:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure and is diffused into the whole network;After other convergence terminal users receive this block structure, include the inside The hash value of contract set extracts, and is compared with the contract set oneself preserved;Oneself a approval is sent simultaneously Contract set give other convergence terminal users;By this transmissions taken turns and compare, all convergence terminal users are advising more Reach an agreement to newest contract set in the fixed time.
This is arrived, then completes the authentication of convergence user terminal, it is made to be linked into block chain network.
Due to general subscriber terminal, i.e. smart machine node, the encrypted transmission of data is only carried out, therefore is directed to single use Family set constructs small-sized block chain network, and in the network, convergence terminal is only deployed as verification node.There is ordinary user Authentication it is as shown in Figure 4:
Step21:The Generic End-User block chain network that user terminal is constituted in by single application scenarios sends registration and asks It asks, block chain returns to Generic End-User a pair of public key and private key;Wherein public key as Generic End-User in the block chain On address, unique key of the private key as corresponding decryption;
Step22:Generic End-User reaches a intelligence about subscription authentication certification with all terminal users on the block chain Energy contract, the terminal user of participation is signed with respective private key respectively, to ensure the validity of contract;
Step23:Intelligent contract diffuses to each convergence terminal user by way of P2P in the block chain network, and first protects It is stored in terminal user's memory of each participation, waits for common recognition and processing of the common recognition time triggered to the intelligent contract of this part;
Step24:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure and is diffused into the whole network;After other convergence terminal users receive this block structure, include the inside The hash value of contract set extracts, and is compared with the contract set oneself preserved;Oneself a approval is sent simultaneously Contract set give other convergence terminal users;By this transmissions taken turns and compare more;All convergence terminal users are advising Reach an agreement to newest contract set in the fixed time.
Block chain Technology application can effectively be reduced into mirror in terminal user's authentication without third party device Cost is weighed, safety is improved, prevents illegal terminal equipment from pretending, while terminal device can also be prevented by external attack.
Two, about the Data Encryption Transmission of convergence terminal.
After completion convergence terminal user and general subscriber terminal are linked into corresponding block chain network, eventually about convergence The data transmission at end is as shown in Figure 5.Diagram as it can be seen that the data transmission about convergence user terminal there are mainly two types of scene;
Scene one:In the set of user terminals where converging user terminal itself, user terminal and general subscriber terminal are converged Between data transmission.
Scene two:It converges user terminal and the information of other convergence terminal users is transmitted.
For above two data transmission scene, it can be based on block chain technology, data encryption is carried out using following below scheme Transmission, while being preserved data as a block.Specific data transmission flow is as shown in Figure 6:
Step31:Transmitting side terminal user is encrypted data using the private key of itself, and into entire block chain network into Row broadcast;
Step32:Receiving terminal terminal user is decrypted using corresponding public key to receiving data, and the data information to receiving The legitimacy of transaction is tested, and by covering timestamp after inspection, data information is included into a block;
Step33:All convergence terminal users give the data information received transaction to cover timestamp in entire block chain network, And it is included in block, while to onblock executing common recognition mechanism;
Step34:Block is stored by being formally included in block chain after algorithmic procedure of knowing together, and is owned in entire block chain network Convergence terminal extended based on the block chain with the block, the manufacture of new block is received per family.
Common recognition mechanism is that block chain interior joint keeps block data consistent, accurately basic, existing mainstream common recognition algorithm Including proof of work(PoW), equity proves(PoS), auspicious wave knows together agreement(RCP)Deng.By taking PoW as an example, refers to and saved by consuming It counts power and forms new block, be that node is traded confirmation for the calculating of network doing mathematics using the computer hardware of itself and carries The process of high security.Merchandise supporter(Miner)The complexity that the continuous software for calculation of operation bit coin software provides on computers Cryptography problem come ensure transaction progress.As the reward serviced them, miner can obtain the transaction that they are confirmed In include service charge, and the bit coin that newly creates.
In above-mentioned Data Encryption Transmission flow, rivest, shamir, adelman is applied, ensures the safety of information source, The safety for further having ensured data transmission, prevents data to be stolen;The decentralization characteristic of block chain is introduced simultaneously, is reinforced The safety of entire communication network.
Three, the monitoring of user terminal
It can be based on the structure of intelligent contract come to all terminal users in block chain network in both block chain structures Carry out performance monitoring.By this terminal monitoring technology, the use state of terminal device can be understood in real time, once occur different Often, it can immediately realize and automated to respond to by intelligent contract.The structure and execution main flow of intelligent contract based on block chain For:Multi-party users participate and draw a intelligent contract jointly;Contract is spread by P2P networks and is stored in block chain;Block chain structure The intelligent contract built executes automatically.Therefore the monitoring flow of terminal user is as shown in Figure 7:
Step41:Terminal user must first be registered as the user of the block chain, be carried out at the same time authentication;
Step42:It needs all terminal users being monitored to decide through consultation a intelligent contract monitored about user jointly, participates in Terminal user signed respectively using respective private key.
Step43:Intelligent contract is broadcasted in the block chain network by way of P2P, is sent to each terminal use Family, the intelligent contract after signature can be present among block chain network according to content therein in the form of code;In block chain Convergence terminal user the intelligent contract received is first saved in memory, wait for common recognition time triggered to the intelligent contract of this part Common recognition and processing;
Step44:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure, is diffused into the whole network;After other aggregation nodes receive this block structure, the conjunction that include the inside is understood The hash value about gathered extracts, and is compared with the contract set oneself preserved;A conjunction oneself approved is sent simultaneously About gather to other convergence terminal users;By this transmissions taken turns and compare more;All convergence terminal users are defined Reach an agreement to newest contract set in time;Once the data information that terminal user sends simultaneously meets touching for intelligent contract Clockwork spring part, block chain network are automatically processed according to intelligent contract.
By monitoring flow above, once user terminal sends out exception information, when meeting the trigger condition of intelligent contract, area Block chain network can automatically carry out corresponding operation according to the intelligent contract about user's monitoring constructed by user.Pass through Above-mentioned user terminal monitoring, can further ensure the safety of user equipment, to protect the safety of whole network.
The preferred embodiment of the present invention has been described above in detail, and still, the invention is not limited in above-mentioned particular implementations Mode, those skilled in the art can modify within the scope of the claims or equivalents, should be included in this hair Within bright protection domain.

Claims (9)

1. the 5G mMTC aggregation node module construction methods based on block chain, it is characterised in that including step:
Macro cells are built, in the tip distributed deployment three of single macro base station or more micro-base station,
User terminal is grouped, using the coverage area of macro cells as boundary, the type of service according to user terminal and geographical location User grouping is carried out, several different types of user's set are become;
Application scenarios generate, one will surrounded corresponding to the access of user terminal that each user gathers using non-orthogonal multiple technology A micro-base station, and pass through double jump link-access net by other Generic End-Users in convergence terminal user's coordinates user set Network.
2. the 5G mMTC aggregation node module construction methods based on block chain according to claim 1, it is characterised in that:With In the end packet of family each user's set comprising only to data be encrypted transmission Generic End-User and more than one Gather this user the convergence terminal user that the data of interior all Generic End-Users are calculated and managed.
3. the 5G mMTC aggregation node module construction methods based on block chain according to claim 2, it is characterised in that:It answers In being generated with scene, the convergence terminal user in each application scenarios forms the first block chain.
4. the 5G mMTC aggregation node module construction methods based on block chain according to claim 2, it is characterised in that:It answers In being generated with scene, is formed by the convergence terminal user in the Generic End-User and this application scene in single application scenarios Two kinds of block chains.
5. the 5G mMTC aggregation node module construction methods based on block chain according to claim 1, it is characterised in that:It answers The process of each end-user access network includes the authentication mechanism of terminal user, convergence terminal user in being generated with scene The monitoring of Data Encryption Transmission and terminal user.
6. the 5G mMTC aggregation node module construction methods based on block chain according to claim 5, it is characterised in that convergence The authentication flow of terminal user includes step:
Step11:Convergence terminal user sends registration request, block chain to the block chain network being made of convergence terminal user Return to convergence terminal user's a pair of public key and private key;Wherein address of the public key as convergence terminal user on the block chain, Unique key of the private key as corresponding decryption;
Step12:Convergence terminal user reaches a intelligence about subscription authentication certification with all terminal users on the block chain Energy contract, the terminal user of participation are signed with respective private key respectively;
Step13:Intelligent contract diffuses to each convergence terminal user by way of P2P in the block chain network, and first protects It is stored in terminal user's memory of each participation, waits for common recognition and processing of the common recognition time triggered to the intelligent contract of this part;
Step14:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure and is diffused into the whole network;After other convergence terminal users receive this block structure, include the inside The hash value of contract set extracts, and is compared with the contract set oneself preserved;Oneself a approval is sent simultaneously Contract set give other convergence terminal users;By this transmissions taken turns and compare, all convergence terminal users are advising more Reach an agreement to newest contract set in the fixed time.
7. the 5G mMTC aggregation node module construction methods based on block chain according to claim 5, it is characterised in that common The authentication flow of terminal user includes step:
Step21:The Generic End-User block chain network that user terminal is constituted in by single application scenarios sends registration and asks It asks, block chain returns to Generic End-User a pair of public key and private key;Wherein public key as Generic End-User in the block chain On address, unique key of the private key as corresponding decryption;
Step22:Generic End-User reaches a intelligence about subscription authentication certification with all terminal users on the block chain Energy contract, the terminal user of participation are signed with respective private key respectively;
Step23:Intelligent contract diffuses to each convergence terminal user by way of P2P in the block chain network, and first protects It is stored in terminal user's memory of each participation, waits for common recognition and processing of the common recognition time triggered to the intelligent contract of this part;
Step24:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure and is diffused into the whole network;After other convergence terminal users receive this block structure, include the inside The hash value of contract set extracts, and is compared with the contract set oneself preserved;Oneself a approval is sent simultaneously Contract set give other convergence terminal users;By this transmissions taken turns and compare more;All convergence terminal users are advising Reach an agreement to newest contract set in the fixed time.
8. the 5G mMTC aggregation node module construction methods based on block chain according to claim 5, it is characterised in that convergence The Data Encryption Transmission flow of terminal user includes step:
Step31:Transmitting side terminal user is encrypted data using the private key of itself, and into entire block chain network into Row broadcast;
Step32:Receiving terminal terminal user is decrypted using corresponding public key to receiving data, and the data information to receiving The legitimacy of transaction is tested, and by covering timestamp after inspection, data information is included into a block;
Step33:All convergence terminal users give the data information received transaction to cover timestamp in entire block chain network, And it is included in block, while to onblock executing common recognition mechanism;
Step34:Block is stored by being formally included in block chain after algorithmic procedure of knowing together, and is owned in entire block chain network Convergence terminal extended based on the block chain with the block, the manufacture of new block is received per family.
9. the 5G mMTC aggregation node module construction methods based on block chain according to claim 5, it is characterised in that terminal The monitoring flow of user includes step:
Step41:Terminal user must first be registered as the user of the block chain, be carried out at the same time authentication;
Step42:It needs all terminal users being monitored to decide through consultation a intelligent contract monitored about user jointly, participates in Terminal user signed respectively using respective private key;
Step43:Intelligent contract is broadcasted in the block chain network by way of P2P, is sent to each terminal user, Intelligent contract after signature can be present among block chain network according to content therein in the form of code;In block chain The intelligent contract received is first saved in memory by convergence terminal user, and common recognition time triggered is waited for be total to the intelligent contract of this part Know and handles;
Step44:Come temporarily when the common recognition time, each convergence terminal user is all intelligent contracts preserved in nearest a period of time It is packaged into a contract set, and the hash value of this contract set is calculated, then by the hash value of this contract set It is assembled into a block structure, is diffused into the whole network;After other aggregation nodes receive this block structure, the conjunction that include the inside is understood The hash value about gathered extracts, and is compared with the contract set oneself preserved;A conjunction oneself approved is sent simultaneously About gather to other convergence terminal users;By this transmissions taken turns and compare more;All convergence terminal users are defined Reach an agreement to newest contract set in time;Once the data information that terminal user sends simultaneously meets touching for intelligent contract Clockwork spring part, block chain network are automatically processed according to intelligent contract.
CN201810431213.8A 2018-05-08 2018-05-08 5G mMTC aggregation node module construction methods based on block chain Pending CN108684018A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810431213.8A CN108684018A (en) 2018-05-08 2018-05-08 5G mMTC aggregation node module construction methods based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810431213.8A CN108684018A (en) 2018-05-08 2018-05-08 5G mMTC aggregation node module construction methods based on block chain

Publications (1)

Publication Number Publication Date
CN108684018A true CN108684018A (en) 2018-10-19

Family

ID=63803010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810431213.8A Pending CN108684018A (en) 2018-05-08 2018-05-08 5G mMTC aggregation node module construction methods based on block chain

Country Status (1)

Country Link
CN (1) CN108684018A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109299347A (en) * 2018-11-16 2019-02-01 大唐高鸿信息通信研究院(义乌)有限公司 A kind of academic information query method and system based on 5G framework and block chain
CN109583810A (en) * 2018-11-16 2019-04-05 大唐高鸿信息通信研究院(义乌)有限公司 A kind of traceability anti-fake system and method based on 5G framework and block chain technology
CN110445827A (en) * 2019-06-06 2019-11-12 中国科学院上海微系统与信息技术研究所 The method for managing security and security system of Sensor Network based on distributed account book technology
CN111148101A (en) * 2019-12-19 2020-05-12 北京邮电大学 Physical layer group authentication method
CN111246474A (en) * 2020-01-10 2020-06-05 中国联合网络通信集团有限公司 Base station authentication method and device
CN111263361A (en) * 2020-01-10 2020-06-09 中国联合网络通信集团有限公司 Connection authentication method and device based on block chain network and micro base station
CN111680312A (en) * 2020-06-05 2020-09-18 宗陈星 Information processing method based on big data and block chain and network security cloud server
CN111885512A (en) * 2020-07-10 2020-11-03 全链通有限公司 Method for acquiring block chain reward by micro base station, accounting node, micro base station and medium
WO2021063030A1 (en) * 2019-09-30 2021-04-08 东南大学 Blockchain-enhanced open internet of things access architecture
CN114531688A (en) * 2022-01-04 2022-05-24 宜兴市苏信智能技术发展研究中心 Wireless networking method based on 5G and block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098180A (en) * 2007-06-04 2008-01-02 华为技术有限公司 Wireless network, terminal message routing method, terminal login and paging method
CN102469516A (en) * 2010-11-04 2012-05-23 中国移动通信集团公司 Network load control method, device and system
CN102469549A (en) * 2010-11-18 2012-05-23 中兴通讯股份有限公司 Network access method and system
CN102804882A (en) * 2009-12-22 2012-11-28 交互数字专利控股公司 Group-based machine to machine communication
CN103391553A (en) * 2013-06-27 2013-11-13 电子科技大学 Flow unloading method based on reference signal received power (RSRP)
CN104184548A (en) * 2014-04-17 2014-12-03 中兴通讯股份有限公司 Random access sequence transmission method and device
CN105794124A (en) * 2013-12-16 2016-07-20 高通股份有限公司 Hybrid relay scheme
CN107944892A (en) * 2017-12-28 2018-04-20 上海唯链信息科技有限公司 A kind of milk supply traceability system based on block chain technology

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101098180A (en) * 2007-06-04 2008-01-02 华为技术有限公司 Wireless network, terminal message routing method, terminal login and paging method
CN102804882A (en) * 2009-12-22 2012-11-28 交互数字专利控股公司 Group-based machine to machine communication
CN102469516A (en) * 2010-11-04 2012-05-23 中国移动通信集团公司 Network load control method, device and system
CN102469549A (en) * 2010-11-18 2012-05-23 中兴通讯股份有限公司 Network access method and system
CN103391553A (en) * 2013-06-27 2013-11-13 电子科技大学 Flow unloading method based on reference signal received power (RSRP)
CN105794124A (en) * 2013-12-16 2016-07-20 高通股份有限公司 Hybrid relay scheme
CN104184548A (en) * 2014-04-17 2014-12-03 中兴通讯股份有限公司 Random access sequence transmission method and device
CN107944892A (en) * 2017-12-28 2018-04-20 上海唯链信息科技有限公司 A kind of milk supply traceability system based on block chain technology

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583810A (en) * 2018-11-16 2019-04-05 大唐高鸿信息通信研究院(义乌)有限公司 A kind of traceability anti-fake system and method based on 5G framework and block chain technology
CN109299347A (en) * 2018-11-16 2019-02-01 大唐高鸿信息通信研究院(义乌)有限公司 A kind of academic information query method and system based on 5G framework and block chain
CN110445827A (en) * 2019-06-06 2019-11-12 中国科学院上海微系统与信息技术研究所 The method for managing security and security system of Sensor Network based on distributed account book technology
CN110445827B (en) * 2019-06-06 2021-05-18 中国科学院上海微系统与信息技术研究所 Security management method and security system of sensor network based on distributed account book technology
WO2021063030A1 (en) * 2019-09-30 2021-04-08 东南大学 Blockchain-enhanced open internet of things access architecture
US11954681B2 (en) 2019-09-30 2024-04-09 Southeast University Blockchain-enhanced open internet of things access architecture
CN111148101A (en) * 2019-12-19 2020-05-12 北京邮电大学 Physical layer group authentication method
CN111263361A (en) * 2020-01-10 2020-06-09 中国联合网络通信集团有限公司 Connection authentication method and device based on block chain network and micro base station
CN111246474B (en) * 2020-01-10 2022-08-23 中国联合网络通信集团有限公司 Base station authentication method and device
CN111263361B (en) * 2020-01-10 2023-04-18 中国联合网络通信集团有限公司 Connection authentication method and device based on block chain network and micro base station
CN111246474A (en) * 2020-01-10 2020-06-05 中国联合网络通信集团有限公司 Base station authentication method and device
CN111680312B (en) * 2020-06-05 2020-12-25 深圳市诚意信科技有限公司 Information processing method based on big data and block chain and network security cloud server
CN111680312A (en) * 2020-06-05 2020-09-18 宗陈星 Information processing method based on big data and block chain and network security cloud server
CN111885512A (en) * 2020-07-10 2020-11-03 全链通有限公司 Method for acquiring block chain reward by micro base station, accounting node, micro base station and medium
CN114531688A (en) * 2022-01-04 2022-05-24 宜兴市苏信智能技术发展研究中心 Wireless networking method based on 5G and block chain

Similar Documents

Publication Publication Date Title
CN108684018A (en) 5G mMTC aggregation node module construction methods based on block chain
Zhang et al. Edge intelligence and blockchain empowered 5G beyond for the industrial Internet of Things
Anguraj et al. Trust-based intrusion detection and clustering approach for wireless body area networks
Nguyen et al. Blockchain for 5G and beyond networks: A state of the art survey
Islam et al. Bus: A blockchain-enabled data acquisition scheme with the assistance of uav swarm in internet of things
Dai et al. Blockchain and deep reinforcement learning empowered intelligent 5G beyond
Islam et al. BUAV: A blockchain based secure UAV-assisted data acquisition scheme in Internet of Things
Samaila et al. Challenges of securing Internet of Things devices: A survey
CN113765713B (en) Data interaction method based on Internet of things equipment acquisition
Deebak et al. TAB-SAPP: A trust-aware blockchain-based seamless authentication for massive IoT-enabled industrial applications
Jan et al. A key agreement scheme for IoD deployment civilian drone
CN105530253B (en) Wireless sensor network access authentication method under Restful framework based on CA certificate
CN110213036A (en) Based on the storage of Internet of Things mist calculating-edge calculations secure data and calculation method
Ataei Nezhad et al. An authentication-based secure data aggregation method in internet of things
CN106453405A (en) Security authentication method for fog node in cloud environment
Mohammad et al. Security weaknesses and attacks on the internet of things applications
Park et al. Inter-authentication and session key sharing procedure for secure M2M/IoT environment
Liu et al. NPMA: A novel privacy-preserving mutual authentication in TMIS for mobile edge-cloud architecture
Goswami et al. A blockchain-based authentication scheme for 5g-enabled iot
CN111200604A (en) Privacy protection method and system based on data aggregation
Fan et al. Understanding security in smart city domains from the ANT-centric perspective
Ahmed et al. Cloud-based remote RFID authentication for security of smart internet of things applications
WO2022222152A1 (en) Federated learning method, federated learning system, first device, and third device
WO2023232072A1 (en) Communication node, data transmission method, and storage medium
CN116318795A (en) Network security protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181019

RJ01 Rejection of invention patent application after publication