CN109639646A - Internet of Things safety detection method and system based on block chain - Google Patents

Internet of Things safety detection method and system based on block chain Download PDF

Info

Publication number
CN109639646A
CN109639646A CN201811364378.4A CN201811364378A CN109639646A CN 109639646 A CN109639646 A CN 109639646A CN 201811364378 A CN201811364378 A CN 201811364378A CN 109639646 A CN109639646 A CN 109639646A
Authority
CN
China
Prior art keywords
internet
things
examining report
block chain
service provider
Prior art date
Application number
CN201811364378.4A
Other languages
Chinese (zh)
Other versions
CN109639646B (en
Inventor
徐恪
吴波
凌思通
李琦
张智超
Original Assignee
清华大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 清华大学 filed Critical 清华大学
Priority to CN201811364378.4A priority Critical patent/CN109639646B/en
Publication of CN109639646A publication Critical patent/CN109639646A/en
Application granted granted Critical
Publication of CN109639646B publication Critical patent/CN109639646B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks

Abstract

The invention discloses a kind of Internet of Things safety detection methods and system based on block chain, state and are broadcasted in the form of intelligent contract to Internet of Things this method comprises: Internet of Things service provider generates system publication, intelligent contract includes the guarantee fund that provider pays;Whether the verifying system publication statement of Internet of Things security detection equipment is very, if true, being recorded in block chain;Detection device obtains corresponding Internet of things system and detects, and detects that loophole then generates the first examining report;Provider verifies this report, if true, being recorded in block chain and generating the second examining report, provider verifies the authenticity and correctness of this report, when being true and correct, is recorded in block chain;Trigger intelligent contract, thus it is ensured that gold is distributed to corresponding detection device;By inquiring examining report, selection system is installed and used.The detection method improves the integrality of Hole Detection, enhances the safety of Internet of Things ecology, and detectability is strong, serious forgiveness is high.

Description

Internet of Things safety detection method and system based on block chain

Technical field

The present invention relates to Internet of Things security technology area, in particular to a kind of Internet of Things safety detection side based on block chain Method and system.

Background technique

With the development of technology of Internet of things, the scale of Internet of Things constantly expands, and arrives the year two thousand twenty, the quantity of internet of things equipment will It is expected that reaching 28,100,000,000.But the great fragility of Internet of things system, security risk, which will be, restricts technology of Internet of things development An important factor for, it is huge due to internet of things equipment quantity, have using distributed denial of service attack caused by these equipment Powerful destructive power.

For Internet of Things security risk, Internet of things system safety detection technology is also evolving, this kind of safety detection master It has the following deficiencies: first is that the safety detection of centralization cannot detect all loopholes well, because of every kind of detection clothes Caused by the differentiation for detectability of being engaged in;Second is that although distributed safety detection improves the ability of Hole Detection, but can not protect Hindering testing result has preferable fault-tolerance, while also lacking and Hole Detection person is attracted to participate in the incentive mechanism of coming in.To sum up may be used Know, although the development of system vulnerability detection technique so that Hole Detection ability is constantly promoted, can not still inhibit malice to attack The person of hitting issues unsafe system.

Block chain technology is proposed in a paper in 2008 by middle acute hearing, using common recognition mechanism, distributed data The distributed account book that a decentralization is realized after storage and point-to-point transmission technology, is introducing cryptography the relevant technologies It is afterwards even more with the characteristic that can not be distorted.Ether mill is then expanded in block chain technology in bit coin, and one kind is introduced The complete intelligent contract development language of figure spirit, so that block chain technology, which has jumped out currency circle, enters various technical fields.Block Operational research of the chain technology in terms of Internet of Things also gradually spreads out and makes some progress, but not yet by block chain skill Art is used for the research in terms of Internet of things system loophole Distributed Detection.

Summary of the invention

The present invention is directed to solve at least some of the technical problems in related technologies.

For this purpose, an object of the present invention is to provide a kind of Internet of Things safety detection method based on block chain, the party Method solves the problems, such as that Hole Detection is incomplete in Internet of Things, constrains the behavior of Internet of Things service provider, improves loophole The integrality of detection enhances the safety of Internet of Things ecology, and detectability is strong, serious forgiveness is high.

It is another object of the present invention to propose a kind of Internet of Things safety detecting system based on block chain.

In order to achieve the above objectives, one aspect of the present invention embodiment proposes a kind of Internet of Things safety detection based on block chain Method, comprising: S1, Internet of Things service provider generate system publication statement, and the system publication statement is with the shape of intelligent contract Formula is broadcasted to entire Internet of Things, and the intelligence contract includes that the Internet of Things service provider is to issue the system publication statement The guarantee fund paid;S2, Internet of Things security detection equipment verify whether the system publication statement is very, to verify the system When system publication is claimed as true, by the system sound release visible record in block chain;S3, the Internet of Things security detection equipment root Corresponding Internet of things system is obtained according to the system publication statement in block chain, and the Internet of things system is detected, Detect that the Internet of things system there are when loophole, generates the first examining report;S4, the Internet of Things service provider verify institute State whether the first examining report is that very, when it is true for verifying first examining report, first examining report is recorded in In the block chain, the Internet of Things security detection equipment generates and submits the second examining report, and the Internet of Things service provides Quotient verifies the authenticity and correctness of second examining report, when it is true and correct for verifying second examining report, Second examining report is recorded in the block chain;S5 triggers the intelligent contract, the Internet of Things service is provided The guarantee fund that quotient is paid by the publication system publication statement is distributed in the form of bonus detects the Internet of Things system There are the Internet of Things security detection equipments of loophole for system;S6, Internet of Things network users are by inquiring the institute recorded in the block chain The second examining report is stated, the safe and reliable Internet of things system is selected to be installed and used.

The Internet of Things safety detection method based on block chain of the embodiment of the present invention, by the excitation for establishing a kind of automation Mechanism attracts Internet of Things security detection equipment to participate in the safety detection of Internet of things system, solves loophole inspection in Internet of Things Incomplete problem is surveyed, while further constraining the behavior of Internet of Things service provider, improves the integrality of Hole Detection, The safety of Internet of Things ecology is enhanced, and detectability is strong, serious forgiveness is high.

In addition, the Internet of Things safety detection method according to the above embodiment of the present invention based on block chain can also have with Under additional technical characteristic:

Further, in one embodiment of the invention, S2 further comprises: S21, and the Internet of Things safety detection is set The standby integrality for detecting the system publication statement, calculates the mark in the system publication statement, and with receive described in Mark in system publication statement is compared, if equal, executes S22;S22, the Internet of Things security detection equipment detection The authenticity of the system publication statement, using the public key of the Internet of Things service provider to the Internet of Things service provider Signature verified, if the signature of the Internet of Things service provider by be greater than half the Internet of Things safety detection set Standby verifying, then the system publication is claimed as true, by the system sound release visible record in the block chain.

Further, in one embodiment of the invention, S3 further comprises: S31, and the Internet of Things safety detection is set The standby download link according in system publication statement downloads the corresponding Internet of things system, and to the Internet of things system Carry out security sweep and detection;S32, when detection springs a leak in the Internet of things system, the Internet of Things security detection equipment It generates first examining report comprising testing result cryptographic Hash and is committed to the Internet of Things service provider.

Further, in one embodiment of the invention, S4 further comprises: S41, the Internet of Things service provider The authenticity for examining first examining report, the peace of Internet of Things described in the public key verifications using the Internet of Things security detection equipment The signature that full inspection measurement equipment uses private key to calculate, is verified, then executes S42;S42, the Internet of Things service provider calculate The mark of the Internet of Things security detection equipment, and with Internet of Things safety detection described in first examining report that receives The mark of equipment is compared, if equal, executes S43;First examining report is recorded in the block chain by S43 And generate the second examining report comprising detailed testing result cryptographic Hash;S44, described in the Internet of Things service provider checks The authenticity of two examining reports, goes to verify the Internet of Things safety detection and sets using the public key of the Internet of Things security detection equipment The standby signature calculated using private key executes S45 if being verified;S45, the Internet of Things service provider calculate described the The cryptographic Hash of two examining reports is simultaneously compared with the cryptographic Hash in second examining report that receives, if equal, is held Row S46;S46, the correctness that the Internet of Things service provider verifies second examining report execute if being verified S47;Second examining report is recorded in the block chain by S47.

Further, in one embodiment of the invention, S5 further comprises: S51, and second examining report is remembered Record triggers the intelligent contract in the block chain;The system is issued the guarantee in statement by S52, the intelligence contract Gold is distributed to the Internet of Things security detection equipment for detecting the Internet of things system there are loophole, and the Internet of Things service mentions Guarantee fund is lost due to publication is there are the Internet of things system of loophole as punishment for quotient.

In order to achieve the above objectives, another aspect of the present invention embodiment proposes a kind of inspection safely of the Internet of Things based on block chain Examining system, comprising: release module generates system publication statement for Internet of Things service provider, system publication statement with The form of intelligent contract is broadcasted to entire Internet of Things, and it is described in publication that the intelligence contract, which includes the Internet of Things service provider, Paid guarantee fund is stated in system publication;First detection module verifies the system hair for Internet of Things security detection equipment Whether cloth statement is very, when the verifying system publication is claimed as true, by the system sound release visible record in block chain; Second detection module is obtained according to the system publication statement in block chain for the Internet of Things security detection equipment and is corresponded to Internet of things system, and detecting to the Internet of things system, detecting the Internet of things system, there are when loophole, generate the One examining report;Third detection module, for the Internet of Things service provider verify first examining report whether be it is true, When it is true for verifying first examining report, first examining report is recorded in the block chain, the Internet of Things Security detection equipment generates and submits the second examining report, and the Internet of Things service provider verifies second examining report Second examining report is recorded in by authenticity and correctness when it is true and correct for verifying second examining report In the block chain;The Internet of Things service provider is to issue the system for triggering the intelligent contract by reward module System publication states that paid guarantee fund is distributed to the institute for detecting the Internet of things system there are loophole in the form of bonus State Internet of Things security detection equipment;Application module, for Internet of Things network users by inquiring record in the block chain described the Two examining reports select the safe and reliable Internet of things system to be installed and used.

The Internet of Things safety detecting system based on block chain of the embodiment of the present invention, by the excitation for establishing a kind of automation Mechanism attracts Internet of Things security detection equipment to participate in the safety detection of Internet of things system, solves loophole inspection in Internet of Things Incomplete problem is surveyed, while further constraining the behavior of Internet of Things service provider, improves the integrality of Hole Detection, The safety of Internet of Things ecology is enhanced, and detectability is strong, serious forgiveness is high.

In addition, the Internet of Things safety detecting system according to the above embodiment of the present invention based on block chain can also have with Under additional technical characteristic:

Further, in one embodiment of the invention, the first detection module is further used for, the Internet of Things Security detection equipment detects the integrality of system publication statement, calculates the mark in the system publication statement, and with connect The mark in system publication statement received is compared, if equal, the Internet of Things security detection equipment detects institute The authenticity for stating system publication statement, using the public key of the Internet of Things service provider to the Internet of Things service provider's Signature is verified, if the signature of the Internet of Things service provider passes through the Internet of Things security detection equipment greater than half Verifying, then system publication is claimed as true, by the system sound release visible record in the block chain.

Further, in one embodiment of the invention, second detection module is further used for, the Internet of Things Security detection equipment downloads the corresponding Internet of things system according to the download link in system publication statement, and to described Internet of things system carries out security sweep and detection;When detection springs a leak in the Internet of things system, the Internet of Things is examined safely Measurement equipment generates first examining report comprising testing result cryptographic Hash and is committed to the Internet of Things service provider.

Further, in one embodiment of the invention, the third detection module is further used for, the Internet of Things The authenticity of first examining report described in service provider checks utilizes the public key verifications institute of the Internet of Things security detection equipment The signature that Internet of Things security detection equipment uses private key to calculate is stated, is verified, then calculates the Internet of Things security detection equipment The mark, and carried out with the mark of Internet of Things security detection equipment described in first examining report that receives It compares, if equal, first examining report is recorded in the block chain and is generated comprising detailed testing result Hash Second examining report of value;The authenticity of second examining report described in the Internet of Things service provider checks, utilizes the object The public key of networking security detection equipment goes to verify the signature that the Internet of Things security detection equipment uses private key to calculate, if verifying is logical Cross, then the Internet of Things service provider calculate second examining report cryptographic Hash and with receive it is described second detection Cryptographic Hash in report compares, if equal, the Internet of Things service provider is verifying second examining report just Second examining report is recorded in the block chain by true property if being verified.

Further, in one embodiment of the invention, the reward module is further used for, and records second inspection Survey is reported in the block chain, triggers the intelligent contract;The system is issued the guarantee in statement by the intelligence contract Gold is distributed to the Internet of Things security detection equipment for detecting the Internet of things system there are loophole, and the Internet of Things service mentions Guarantee fund is lost due to publication is there are the Internet of things system of loophole as punishment for quotient.

The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description Obviously, or practice through the invention is recognized.

Detailed description of the invention

Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:

Fig. 1 is the frame diagram according to the Internet of Things safety detection method based on block chain of one embodiment of the invention;

Fig. 2 is the flow chart according to the Internet of Things safety detection method based on block chain of one embodiment of the invention;

Fig. 3 is to be issued to scheme according to the Internet of Things Service Providers system of one embodiment of the invention;

Fig. 4 is to submit examining report figure according to the Internet of Things security detection equipment of one embodiment of the invention;

Fig. 5 is the block chain structure schematic diagram comprising examining report according to one embodiment of the invention;

Fig. 6 is the process according to the Internet of Things safety detection method based on block chain of a specific embodiment of the invention Figure;

Fig. 7 is each pass according to the Internet of Things safety detection method based on block chain of a specific embodiment of the invention Key flow chart of steps;

Fig. 8 is the Internet of Things safety detecting system structural representation based on block chain according to a specific embodiment of the invention Figure.

Specific embodiment

The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.

The Internet of Things safety detection method based on block chain proposed according to embodiments of the present invention is described with reference to the accompanying drawings And system, the Internet of Things safety detection side based on block chain proposed according to embodiments of the present invention is described with reference to the accompanying drawings first Method.

As shown in Figure 1, Internet of Things safety detection method includes Three role: (1) Internet of Things service provider, including Internet of Things Manufacturer and third party's software and hardware market etc. are netted, the creation and maintenance of publication Internet of things system and block chain account book are mainly responsible for;(2) Internet of Things security detection equipment including numerous Internet of Things safety detection manufacturers, Internet of Things safety detection person and has safety inspection The internet of things equipment etc. of survey ability;(3) internet of things equipment and user are mainly responsible for the Internet of things system of installation publication and it is desirable that obtain Obtain corresponding safety feedback (safety detection result as being directed to a certain Internet of things system).

Fig. 2 is the flow chart according to the Internet of Things safety detection method based on block chain of one embodiment of the invention.

As shown in Fig. 2, should Internet of Things safety detection method based on block chain the following steps are included:

In step sl, Internet of Things service provider generates system publication statement, and system publication statement is with intelligent contract Form broadcasts the guarantor paid to entire Internet of Things, intelligent contract inclusion the Internet services provider by delivery system publication statement Card gold.

Specifically, Internet of Things service provider generates system publication statement Δ, and Δ is broadcasted in the form of intelligent contract to whole A Internet of Things, the format of Δ are Δ={ Δid, Pi, Un, Uv, Uh, Ul, Ii, Psign, wherein PiIt is each Internet of Things service provider Unique identification, Un、Uv、Uh、UlThe respectively title, version, cryptographic Hash and download link of Internet of things system, IiIt is Internet of Things The guarantee fund that service provider submits while system is issued, the guarantee when the Internet of things system of publication is detected loophole Gold can be distributed to corresponding detection device in reward in a manner of excitation;ΔidThe unique identification of statement Δ is issued for system, Value is hexa-atomic group of Pi, Un, Uv, Uh, Ul, IiCryptographic Hash, i.e. Δid=H (Pi||Un||Uv||Uh||Ul||Ii), PsignIt should for publication The signature of the Internet of Things service provider of system, the signature is by Internet of Things service provider's private key skPiIt calculates and obtains, i.e.,

In step s 2, whether Internet of Things security detection equipment verifying system publication statement is very, in verifying system publication When being claimed as true, by system sound release visible record in block chain.

Further, in one embodiment of the invention, can also include:

S21, the integrality of Internet of Things security detection equipment detection system publication statement, computing system issue the mark in statement Know, and be compared with the mark in the system publication statement received, if equal, executes S22;

S22, the authenticity of Internet of Things security detection equipment detection system publication statement, utilizes Internet of Things service provider's Public key verifies the signature of Internet of Things service provider, if the signature of Internet of Things service provider passes through the object greater than half The verifying of networking security detection equipment, then system publication is claimed as true, by system sound release visible record in block chain.

Specifically, Internet of Things detection device detects the integrality of Δ, i.e., counts again after receiving system publication statement Δ Calculate Δid=(Pi||Un||Uv||Uh||Ul||Ii), and with the Δ in the Δ that receivesidIt is compared, if the two etc., loses The Δ received is abandoned, if the two is equal, the authenticity of Δ is detected, that is, utilizes the public key pkP of Internet of Things service provideriIt is right Sign PsignIt is verified, as signature PsignWhen by being more than the verifying of half detection device, illustrate that system publication statement Δ is true Real, the generation of spoof attacks is avoided, while Δ will be recorded among block chain.

As shown in Figure 3, it is to be understood that the system is issued specifically with Δ={ Δid, Pi, Un, Uv, Uh, Ul, Ii, Psign} Form broadcasted, Internet of Things security detection equipment is after receiving Δ, first to ΔidAnd PsignAuthenticity verification is carried out, If being verified, verification result submitted to numerous Internet of Things service providers, and Internet of Things service provider then basis The quantity of the verification result received, which decides whether to issue the system, to be written in block chain.Include 6 Internet of Things detections in Fig. 1 Equipment, if Δ has been more than the verifying of 3 detection devices, system publication Δ is written to block chain by Internet of Things service provider In, otherwise, it is invalid which, which issues Δ,.

In step s3, Internet of Things security detection equipment obtains corresponding Internet of Things according to the system publication statement in block chain System, and detecting to Internet of things system is detecting that Internet of things system there are when loophole, generates the first examining report.

Further, in one embodiment of the invention, can also include:

S31, Internet of Things security detection equipment download corresponding Internet of Things system according to the download link in system publication statement System, and security sweep and detection are carried out to Internet of things system;

S32, when detection springs a leak in Internet of things system, it includes testing result Hash that Internet of Things security detection equipment, which generates, First examining report of value is simultaneously committed to Internet of Things service provider.

Specifically, Internet of things system publication statement Δ is recorded in after block chain, and Internet of Things detection device is according in Δ UlIt downloads corresponding Internet of things system, and security sweep and detection is carried out to the system, when being detected in Internet of things system When loophole, detection device need to submit the examining report comprising testing result, but testing result is plagiarized in order to prevent, detection device It needs to submit initial examining report firstThis report only includes the cryptographic Hash of testing result, and does not include detailed detection and tie Fruit, specific format are as follows:Wherein, DiFor Internet of Things security detection equipment Mark,It is the second examining reportCryptographic Hash,It is the wallet address of Internet of Things security detection equipment,For Unique identification, can be by four-tuple Δ, Di,It is obtained through Hash calculation, i.e., Its private key skD is used for detection deviceiThe signature of calculating, specifically from following formula calculating:WhenIt is recorded in after block chain, detection device submits the second examining reportWherein Des is detailed testing result,ForUnique identification, It can be by four-tuple Δ, Di,Des is obtained through Hash calculation, i.e., It is set for detection It is standby to use its private key skDiThe signature of calculating, i.e.,

In step s 4, Internet of Things service provider verifies whether the first examining report is very, to detect and report in verifying first When announcement is true, the first examining report is recorded in block chain, Internet of Things security detection equipment generates and submits the second detection report It accuses, Internet of Things service provider verifies the authenticity and correctness of the second examining report, is very simultaneously verifying the second examining report And when correct, the second examining report is recorded in block chain.

Further, in one embodiment of the invention, can also include:

S41, the authenticity of the first examining report of Internet of Things service provider checks, utilizes Internet of Things security detection equipment The signature that public key verifications Internet of Things security detection equipment uses private key to calculate, is verified, then executes S42;

S42, Internet of Things service provider calculate Internet of Things security detection equipment mark, and with receive first detection The mark of Internet of Things security detection equipment is compared in report, if equal, executes S43;

First examining report is recorded in block chain and generates the second inspection comprising detailed testing result cryptographic Hash by S43 Observe and predict announcement;

S44, the authenticity of the second examining report of Internet of Things service provider checks, utilizes Internet of Things security detection equipment Public key goes verifying Internet of Things security detection equipment to execute S45 if being verified using the signature that private key calculates;

S45, Internet of Things service provider calculate the cryptographic Hash of the second examining report and with the second examining report for receiving In cryptographic Hash compare, if equal, execute S46;

S46, the correctness that Internet of Things service provider verifies the second examining report execute S47 if being verified;

Second examining report is recorded in block chain by S47.

Specifically, each Internet of Things service provider goes verifying to sign after receiving the first examining report with corresponding public keyIt is calculated after being verifiedAnd withIt is compared, it is equal then to be known together by PoW Mechanism reports initial detectingBe recorded in block chain, each Internet of Things service provider after receiving the second examining report with pair The public key answered goes verifying to signIt is then calculated after being verifiedAnd withIt is compared, equal then Internet of Things service Provider pairIn testing result Des carry out verification of correctness, if the testing result in Des be all correctly, pass through Proof of work (Proof Of Work, abbreviation PoW) knows together mechanism for final examining reportIt is recorded in block chain.

In step s 5, intelligent contract is triggered, Internet of Things service provider is paid by delivery system publication statement Guarantee fund is distributed to the Internet of Things security detection equipment for detecting Internet of things system there are loophole in the form of bonus.

Specifically, the second examining reportIt is recorded in block chain, triggers the intelligence of record system publication statement Δ Contract, by the guarantee fund in system publication statement Δ, the automatic distributing in a manner of motivating gives corresponding inspection to the intelligent contract being triggered Measurement equipment, meanwhile, Internet of Things service provider is also to lose the guarantee fund paid work due to issuing leaky Internet of things system For punishment.

As shown in Figure 4, it is to be understood that when system publication Δ is recorded in block chain, Internet of Things detection device Pass through the U in ΔlThe Internet of things system of publication is downloaded to, and carries out safety detection and scanning.When finding loophole, Internet of Things inspection Measurement equipment submits the initial detecting comprising testing result cryptographic Hash to report firstThe examining reportBy authenticity verification it Initial detecting Reporting Blocks chain is logged by PoW common recognition afterwards, is otherwise abandoned;Then, Internet of Things detection device is submitted Final examining report comprising detailed testing resultThe examining reportBy after authenticity verification and verification of correctness It can be written in block chain by Internet of Things service provider according to PoW common recognition, otherwise be abandoned;Final examining report charges to area After block chain then can automatic trigger corresponding system publication statement Δ, and Internet of things system provider submits when the statement is issued Guarantee fund is automatically assigned to detection device and serves as remuneration.

In step s 6, Internet of Things network users are selected secure and trusted by the second examining report recorded in inquiry block chain Internet of things system installed and used.

The embodiment of the present invention introduces Internet of Things security detection equipment detectable substance the Internet services provider hair by reward mechanism The system of cloth is advantageously formed to the more comprehensive safety feedback of Internet of things system, and Internet of Things service provider can not be easily Publication has leaky Internet of things system, and the behavior of its own is able to ascend the safety of entire Internet of Things by security constraint, To establish a safer Internet of Things ecosystem.

It is situated between in detail to the Internet of Things safety detection method based on block chain of the embodiment of the present invention with reference to the accompanying drawing It continues.

It mainly include the area Shang Yige as shown in figure 5, having recorded the block chain framework of Internet of things system safety detection report Block label, block label, timestamp, random number and examining report this five.Wherein, upper block label is so that each block Connection forms a chain;Timestamp has recorded the time of block creation;Examining report is that detection device is submitted and passes through verifying Report, each report are chained up in the form of Mei Keer tree;Block label is upper block label, timestamp, examining report And the cryptographic Hash of random number, Internet of Things service provider make cryptographic Hash meet certain form by attempting various random numbers Proof of work is completed to successfully create block, after detection device submits examining report, Internet of Things service provider will It is recorded in block chain by the examining report of authenticity verification and verification of correctness.

Fig. 6 and Fig. 7 respectively indicates the fine granularity of the Internet of Things safety detection method based on block chain and the process of coarseness Figure can be seen that from flow chart when examining report is recorded in block chain, with the system hair of intelligent forms of contract storage Cloth statement Δ can be triggered, and the guarantee fund that Internet of Things service provider pays can be issued to Internet of Things detection in the form of excitation and be set It is standby.Meanwhile internet of things equipment can be inquired with user recorded in block chain test result selection it is more safe and reliable Internet of things system is installed and used.

From the point of view of above-mentioned specific embodiment, the Internet of Things safety detection method of the invention based on block chain introduces intelligence Energy contract collects guarantee fund from the Internet of Things provider of delivery system and is distributed to the detection for detecting the system security risk Equipment, the form that examining report is submitted in introducing stage by stage avoid the behaviors such as the plagiarization being likely to occur between detection device, forgery, It allows Internet of Things service provider to test testing result and safeguards relevant block chain.

In summary, this method can be realized while uneasy system-wide Internet of Things service provider is issued in strike The lightweight of Internet of things system detection device detects and fair and just distribution is centainly rewarded, and inhibits bad system to mention to reach For quotient and attract more detection devices that the purpose of system safety detection is added, enables a user to access more authoritative system peace Full assessment helps to build a safer environment of internet of things.

Internet of Things safety detection method according to an embodiment of the present invention based on block chain, by establishing a kind of automation Incentive mechanism attracts Internet of Things security detection equipment to participate in the safety detection of Internet of things system, solves to leak in Internet of Things Incomplete problem is detected in hole, while further constraining the behavior of Internet of Things service provider, improves the complete of Hole Detection Whole property enhances the safety of Internet of Things ecology, and detectability is strong, serious forgiveness is high.

The Internet of Things safety detecting system based on block chain proposed according to embodiments of the present invention is described referring next to attached drawing.

Fig. 8 is the Internet of Things safety detecting system structural schematic diagram based on block chain of one embodiment of the invention.

As shown in figure 8, being somebody's turn to do the Internet of Things safety detecting system 10 based on block chain includes: that release module 100, first detects Module 200, the second detection module 300, third detection module 400, reward module 500 and application module 600.

Wherein, release module 100 generates system publication statement for Internet of Things service provider, and system publication statement is with intelligence The form of energy contract is broadcasted to entire Internet of Things, and intelligent contract inclusion the Internet services provider is that delivery system issues statement institute The guarantee fund paid.

Whether first detection module 200 is very, to verify for Internet of Things security detection equipment verifying system publication statement When system publication is claimed as true, by system sound release visible record in block chain.

Second detection module 300 is for Internet of Things security detection equipment according to the system publication statement acquisition pair in block chain Internet of things system is answered, and Internet of things system is detected, there are when loophole, generate the first detection detecting Internet of things system Report.

Third detection module 400 for Internet of Things service provider verify the first examining report whether be it is true, in verifying the When one examining report is true, the first examining report is recorded in block chain, Internet of Things security detection equipment generates and submits packet The second examining report containing detailed testing result cryptographic Hash, Internet of Things service provider verify the second examining report authenticity with Second examining report is recorded in block chain by correctness when it is true and correct for verifying the second examining report.

Reward module 500 is paid for triggering intelligent contract, by Internet of Things service provider by delivery system publication statement The guarantee fund received is distributed to the Internet of Things security detection equipment for detecting Internet of things system there are loophole in the form of bonus.

Application module 600, by the second examining report recorded in inquiry block chain, selects safety for Internet of Things network users Believable Internet of things system is installed and used.The Internet of Things safety detecting system 10 based on block chain solves in Internet of Things The incomplete problem of Hole Detection, constrains the behavior of Internet of Things service provider, improves the integrality of Hole Detection, enhancing The safety of Internet of Things ecology, and detectability is strong, serious forgiveness is high.

Further, in one embodiment of the invention, first detection module is further used for, Internet of Things safety detection The integrality of device detection system publication statement, the mark in computing system publication statement, and with the system sound release that receives Mark in bright is compared, if equal, the authenticity of Internet of Things security detection equipment detection system publication statement utilizes object The public key of the Internet services provider verifies the signature of Internet of Things service provider, if the signature of Internet of Things service provider By being greater than the verifying of the Internet of Things security detection equipment of half, then system publication is claimed as true, by system sound release visible record In block chain.

Further, in one embodiment of the invention, the second detection module is further used for, Internet of Things safety detection Equipment downloads corresponding Internet of things system according to the download link in system publication statement, and carries out safety to Internet of things system and sweep It retouches and detects;When detection springs a leak in Internet of things system, it includes testing result cryptographic Hash that Internet of Things security detection equipment, which generates, The first examining report and be committed to Internet of Things service provider.

Further, in one embodiment of the invention, third detection module is further used for, and Internet of Things service provides The authenticity of the first examining report is tested in commodity inspection, utilizes the public key verifications Internet of Things security detection equipment of Internet of Things security detection equipment The signature calculated using private key, is verified, then calculates the mark of Internet of Things security detection equipment, and with the first inspection for receiving The mark for observing and predicting Internet of Things security detection equipment in accusing is compared, if equal, the first examining report is recorded in block chain In and generate include detailed testing result cryptographic Hash the second examining report;The second examining report of Internet of Things service provider checks Authenticity, using the public key of Internet of Things security detection equipment go verifying Internet of Things security detection equipment use private key calculate label Name, if being verified, Internet of Things service provider calculate the second examining report cryptographic Hash and with receive second detection Cryptographic Hash in report compares, if equal, Internet of Things service provider verifies the correctness of the second examining report, if testing Card passes through, then the second examining report is recorded in block chain.

Further, in one embodiment of the invention, reward module is further used for, and the second examining report of record exists In block chain, intelligent contract is triggered;Guarantee fund in system publication statement is distributed to and detects Internet of things system by intelligent contract There are the Internet of Things security detection equipment of loophole, Internet of Things service provider is due to publication is there are the Internet of things system of loophole to lose Go guarantee fund for punishment.

It should be noted that the aforementioned explanation to the Internet of Things safety detection method embodiment based on block chain is also fitted For the system of the embodiment, details are not described herein again.

The Internet of Things safety detecting system based on block chain proposed according to embodiments of the present invention, it is a kind of automatic by establishing The incentive mechanism of change attracts Internet of Things security detection equipment to participate in the safety detection of Internet of things system, solves Internet of Things The middle incomplete problem of Hole Detection, while the behavior of Internet of Things service provider is further constrained, improve Hole Detection Integrality, enhance the safety of Internet of Things ecology, and detectability is strong, serious forgiveness is high.

In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.

In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.

Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of Internet of Things safety detection method based on block chain, which comprises the following steps:
S1, Internet of Things service provider generate system publication statement, and the system publication statement is broadcasted in the form of intelligent contract To entire Internet of Things, the intelligence contract includes that the Internet of Things service provider is paid by the publication system publication statement Guarantee fund;
S2, Internet of Things security detection equipment verify whether the system publication statement is very, to verify the system publication statement When being true, by the system sound release visible record in block chain;
S3, the Internet of Things security detection equipment obtain corresponding Internet of Things system according to the system publication statement in block chain System, and the Internet of things system is detected, detecting the Internet of things system, there are when loophole, generate the first detection report It accuses;
S4, the Internet of Things service provider verify whether first examining report is very, to verify the first detection report When announcement is true, first examining report is recorded in the block chain, the Internet of Things security detection equipment is generated and mentioned The second examining report is handed over, the Internet of Things service provider verifies the authenticity and correctness of second examining report, testing When to demonstrate,prove second examining report be true and correct, second examining report is recorded in the block chain;
S5 triggers the intelligent contract, and the Internet of Things service provider is paid by the publication system publication statement Guarantee fund is distributed in the form of bonus to be detected the Internet of things system there are the Internet of Things safety detections of loophole to set It is standby;
S6, Internet of Things network users select safe and reliable institute by inquiring second examining report recorded in the block chain Internet of things system is stated to be installed and used.
2. the Internet of Things safety detection method according to claim 1 based on block chain, which is characterized in that S2 is further wrapped It includes:
S21, the Internet of Things security detection equipment detect the integrality of the system publication statement, calculate the system sound release Mark in bright, and be compared with the mark in the system publication statement received, if equal, execute S22;
S22, the Internet of Things security detection equipment detect the authenticity of the system publication statement, utilize the Internet of Things service The public key of provider verifies the signature of the Internet of Things service provider, if the signature of the Internet of Things service provider By being greater than the verifying of the Internet of Things security detection equipment of half, then the system publication is claimed as true, by the system Sound release visible record is in the block chain.
3. the Internet of Things safety detection method according to claim 1 based on block chain, which is characterized in that S3 is further wrapped It includes:
S31, the Internet of Things security detection equipment are corresponding described according to the download link downloading in system publication statement Internet of things system, and security sweep and detection are carried out to the Internet of things system;
S32, when detection springs a leak in the Internet of things system, it includes testing result that the Internet of Things security detection equipment, which generates, First examining report of cryptographic Hash is simultaneously committed to the Internet of Things service provider.
4. the Internet of Things safety detection method according to claim 1 based on block chain, feature exist, S4 is further wrapped It includes:
S41, the authenticity of the first examining report described in the Internet of Things service provider checks utilize the Internet of Things to examine safely The signature that Internet of Things security detection equipment described in the public key verifications of measurement equipment uses private key to calculate, is verified, then executes S42;
S42, the Internet of Things service provider calculate the mark of the Internet of Things security detection equipment, and with receive described in The mark of Internet of Things security detection equipment described in first examining report is compared, if equal, executes S43;
S43, first examining report is recorded in the block chain and generate comprising detailed testing result cryptographic Hash the Two examining reports;
S44, the authenticity of the second examining report described in the Internet of Things service provider checks utilize the Internet of Things to examine safely The public key of measurement equipment is removed to verify the Internet of Things security detection equipment and is executed using the signature that private key calculates if being verified S45;
S45, the Internet of Things service provider calculate the cryptographic Hash of second examining report and with receive described second Cryptographic Hash in examining report compares, if equal, executes S46;
S46, the correctness that the Internet of Things service provider verifies second examining report execute if being verified S47;
Second examining report is recorded in the block chain by S47.
5. the Internet of Things safety detection method according to claim 1 based on block chain, which is characterized in that S5 is further wrapped It includes:
S51, second examining report are recorded in the block chain, trigger the intelligent contract;
Guarantee fund in system publication statement is distributed to and detects that the Internet of things system is deposited by S52, the intelligence contract In the Internet of Things security detection equipment of loophole, the Internet of Things service provider is because there are the Internet of Things of loophole for publication System and with lose guarantee fund for punishment.
6. a kind of Internet of Things safety detecting system based on block chain characterized by comprising
Release module generates system publication statement for Internet of Things service provider, and the system publication statement is with intelligent contract Form broadcast to entire Internet of Things, the intelligence contract includes that the Internet of Things service provider is to issue the system publication State paid guarantee fund;
First detection module verifies whether the system publication statement is very, in verifying institute for Internet of Things security detection equipment System publication is stated when being claimed as true, by the system sound release visible record in block chain;
Second detection module is obtained for the Internet of Things security detection equipment according to the system publication statement in block chain Corresponding Internet of things system, and the Internet of things system is detected, detect the Internet of things system there are when loophole, it is raw At the first examining report;
Third detection module verifies whether first examining report is very, to verify for the Internet of Things service provider When first examining report is true, first examining report is recorded in the block chain, the Internet of Things is examined safely Measurement equipment generates and submits the second examining report, and the Internet of Things service provider verifies the authenticity of second examining report Second examining report is recorded in the area when it is true and correct for verifying second examining report with correctness In block chain;
The Internet of Things service provider is to issue the system sound release for triggering the intelligent contract by reward module Bright paid guarantee fund is distributed to the Internet of Things for detecting the Internet of things system there are loophole in the form of bonus Security detection equipment;
Application module, for Internet of Things network users by inquiring second examining report recorded in the block chain, selection peace The complete believable Internet of things system is installed and used.
7. the Internet of Things safety detecting system according to claim 6 based on block chain, which is characterized in that first inspection Module is surveyed to be further used for,
The Internet of Things security detection equipment detects the integrality of the system publication statement, calculates in the system publication statement Mark, and be compared with the mark in the system publication statement received, if equal, the Internet of Things is examined safely Measurement equipment detects the authenticity of the system publication statement, using the public key of the Internet of Things service provider to the Internet of Things The signature of service provider is verified, if the signature of the Internet of Things service provider passes through the Internet of Things greater than half The verifying of security detection equipment, then the system publication is claimed as true, by the system sound release visible record in the block chain In.
8. the Internet of Things safety detecting system according to claim 6 based on block chain, which is characterized in that second inspection Module is surveyed to be further used for,
The Internet of Things security detection equipment downloads the corresponding Internet of Things according to the download link in system publication statement Net system, and security sweep and detection are carried out to the Internet of things system;
When detection springs a leak in the Internet of things system, it includes testing result Hash that the Internet of Things security detection equipment, which generates, First examining report of value is simultaneously committed to the Internet of Things service provider.
9. the Internet of Things safety detecting system according to claim 6 based on block chain, which is characterized in that the third inspection Module is surveyed to be further used for,
The authenticity of first examining report described in the Internet of Things service provider checks is set using the Internet of Things safety detection The signature that Internet of Things security detection equipment described in standby public key verifications uses private key to calculate, is verified, then calculates the Internet of Things The mark of net security detection equipment, and with Internet of Things security detection equipment described in first examining report that receives The mark be compared, if equal, first examining report is recorded in the block chain and is generated comprising detailed Second examining report of thin testing result cryptographic Hash;
The authenticity of second examining report described in the Internet of Things service provider checks is set using the Internet of Things safety detection Standby public key goes to verify the signature that the Internet of Things security detection equipment uses private key to calculate, if being verified, the Internet of Things Net service provider calculate the cryptographic Hash of second examining report and with the Hash in second examining report that receives Value compares, if equal, the Internet of Things service provider verifies the correctness of second examining report, if verifying is logical It crosses, then second examining report is recorded in the block chain.
10. the Internet of Things safety detecting system according to claim 6 based on block chain, which is characterized in that the reward Module is further used for,
Second examining report is recorded in the block chain, triggers the intelligent contract;
Guarantee fund in system publication statement is distributed to and detects that the Internet of things system has leakage by the intelligence contract The Internet of Things security detection equipment in hole, the Internet of Things service provider is because there are the Internet of things system of loophole for publication And to lose guarantee fund as punishment.
CN201811364378.4A 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system CN109639646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811364378.4A CN109639646B (en) 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811364378.4A CN109639646B (en) 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system
PCT/CN2019/112322 WO2020098454A1 (en) 2018-11-16 2019-10-21 Method and system for detecting security of internet to things based on blockchain

Publications (2)

Publication Number Publication Date
CN109639646A true CN109639646A (en) 2019-04-16
CN109639646B CN109639646B (en) 2020-04-24

Family

ID=66068201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811364378.4A CN109639646B (en) 2018-11-16 2018-11-16 Block chain-based Internet of things safety detection method and system

Country Status (2)

Country Link
CN (1) CN109639646B (en)
WO (1) WO2020098454A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019170173A3 (en) * 2019-06-27 2020-04-23 Alibaba Group Holding Limited Managing cybersecurity vulnerabilities using blockchain networks
WO2020098454A1 (en) * 2018-11-16 2020-05-22 清华大学 Method and system for detecting security of internet to things based on blockchain
US10698738B1 (en) 2019-06-27 2020-06-30 Alibaba Group Holding Limited Implementing a blockchain-based workflow

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363783A1 (en) * 2014-06-16 2015-12-17 Bank Of America Corporation Cryptocurrency risk detection system
CN106204057A (en) * 2016-06-27 2016-12-07 惠众商务顾问(北京)有限公司 Physical message accidental validation block chain method for anti-counterfeit, system and device
US20170221288A1 (en) * 2016-02-02 2017-08-03 David Johnson Decentralized virtual trustless ledger for access control
CN107171794A (en) * 2017-06-27 2017-09-15 葛峰 A kind of electronic document based on block chain and intelligent contract signs method
CN107346482A (en) * 2017-05-12 2017-11-14 深圳蜂链科技有限公司 The method and device that block chain is docked, verifies, known together with the outer data of chain
CN107566381A (en) * 2017-09-12 2018-01-09 中国联合网络通信集团有限公司 Equipment safety control method, apparatus and system
CN107819848A (en) * 2017-11-08 2018-03-20 济南浪潮高新科技投资发展有限公司 A kind of internet of things equipment autonomy interconnected method based on block chain
CN108196872A (en) * 2017-12-27 2018-06-22 邵美 The upgrade method of intelligent contract in a kind of block catenary system
CN108388806A (en) * 2018-02-12 2018-08-10 徐正伟 A kind of Internet of Things security hardening based on block chain and data Right protection device
US20180315055A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3123423A4 (en) * 2014-03-27 2017-08-30 Nokia Technologies Oy Method and apparatus for automatic inter-device authorisation
CN108737370A (en) * 2018-04-05 2018-11-02 西安电子科技大学 A kind of cross-domain Verification System of Internet of Things based on block chain and method
CN109639646B (en) * 2018-11-16 2020-04-24 清华大学 Block chain-based Internet of things safety detection method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363783A1 (en) * 2014-06-16 2015-12-17 Bank Of America Corporation Cryptocurrency risk detection system
US20170221288A1 (en) * 2016-02-02 2017-08-03 David Johnson Decentralized virtual trustless ledger for access control
CN106204057A (en) * 2016-06-27 2016-12-07 惠众商务顾问(北京)有限公司 Physical message accidental validation block chain method for anti-counterfeit, system and device
US20180315055A1 (en) * 2017-05-01 2018-11-01 International Business Machines Corporation Blockchain For Issue/Defect Tracking System
CN107346482A (en) * 2017-05-12 2017-11-14 深圳蜂链科技有限公司 The method and device that block chain is docked, verifies, known together with the outer data of chain
CN107171794A (en) * 2017-06-27 2017-09-15 葛峰 A kind of electronic document based on block chain and intelligent contract signs method
CN107566381A (en) * 2017-09-12 2018-01-09 中国联合网络通信集团有限公司 Equipment safety control method, apparatus and system
CN107819848A (en) * 2017-11-08 2018-03-20 济南浪潮高新科技投资发展有限公司 A kind of internet of things equipment autonomy interconnected method based on block chain
CN108196872A (en) * 2017-12-27 2018-06-22 邵美 The upgrade method of intelligent contract in a kind of block catenary system
CN108388806A (en) * 2018-02-12 2018-08-10 徐正伟 A kind of Internet of Things security hardening based on block chain and data Right protection device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BOGDAN CRISTIAN FLOREA: "Blockchain and internet of Things data provider for smart applications", 《2018 7TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO)》 *
丁庆洋,朱建明: "区块链视角下的B2C电商平台产品信息追溯和防伪模型", 《中国流通经济》 *
徐恪; 吴波; 沈蒙: "区块链:描绘物联网安全新愿景", 《中兴通讯技术》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020098454A1 (en) * 2018-11-16 2020-05-22 清华大学 Method and system for detecting security of internet to things based on blockchain
WO2019170173A3 (en) * 2019-06-27 2020-04-23 Alibaba Group Holding Limited Managing cybersecurity vulnerabilities using blockchain networks
US10698738B1 (en) 2019-06-27 2020-06-30 Alibaba Group Holding Limited Implementing a blockchain-based workflow

Also Published As

Publication number Publication date
CN109639646B (en) 2020-04-24
WO2020098454A1 (en) 2020-05-22

Similar Documents

Publication Publication Date Title
Sasson et al. Zerocash: Decentralized anonymous payments from bitcoin
Bamert et al. Have a snack, pay with Bitcoins
O'Gorman et al. Ransomware: A growing menace
Androulaki et al. Evaluating user privacy in bitcoin
US9704353B2 (en) Dynamic pin pad for credit/debit/ other electronic transactions
CN103890771B (en) User-defined countermeasures
CN106952094B (en) Electronic bill management method and device
Bartoletti et al. Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact
Hong The state of phishing attacks
CN103370716B (en) Electric power fingerprint is used to monitor the method and system of integrity based on computer system
Bowen et al. Measuring the human factor of cyber security
US20130232577A1 (en) Information System Security Based on Threat Vectors
Wong et al. Artificial immune systems for the detection of credit card fraud: an architecture, prototype and preliminary results
CN105009137B (en) Orient safety warning
JP5406195B2 (en) Apparatus for reconfiguring a technical system based on security analysis, and corresponding technical decision support system and computer program product
CA2641656C (en) Methods and system for determining performance of filters in a computer intrusion prevention detection system
Küsters et al. Verifiability, privacy, and coercion-resistance: New insights from a case study
Li et al. DDOA: A dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system
CN107181765A (en) Network digital identity identifying method based on block chain technology
Lippmann et al. Improving intrusion detection performance using keyword selection and neural networks
Berbain et al. An efficient forward private RFID protocol
US9064364B2 (en) Confidential fraud detection system and method
CN103403728B (en) Dispose the information after coding
CN101883024B (en) Dynamic detection method for cross-site forged request
US20160330034A1 (en) Transferring ledger assets between blockchains via pegged sidechains

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant