Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a scientific research data privacy protection enhancement method and system facing to a wireless network environment, and solves the problems of authentication between mobile devices and interception of information by an attacker launching interception attack on a wireless channel in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
according to a first aspect of the invention, a scientific research data privacy protection enhancement method facing a wireless network environment is provided, and the method comprises the following steps:
s1, establishing a change mode of different postures and displacements of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
s2, quantizing the data sequence subjected to the calibration processing into a bit sequence;
s3, calculating a key according to the bit sequence of each mobile device by using a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating a unique and random symmetric key and establishing complete connection.
In some embodiments of the first aspect of the present invention, the step S1 includes: establishing different changing modes of postures and displacements for the mobile device by executing the behavior of shaking or overturning the mobile device; the RSSI sequence is subjected to numerical value anomaly detection by taking the received signal strength RSSI of a wireless network signal received by the mobile equipment as feedback for wireless channel change, the RSSI characteristic value of a vibration event of the mobile equipment is detected to be taken as the initial point of equipment posture or position change, and the initial points and tracks of a plurality of mobile equipment are synchronized; carrying out interpolation processing on the data sequence and smoothing the track of the RSSI sequence; and filtering the RSSI sequences of different frequency bands by adopting an infinite impulse response filter.
In some embodiments of the first aspect of the present invention, the synchronizing the starting points and the trajectories of the plurality of mobile devices comprises: sliding a window along the original RSSI data sequence, wherein the size of the sliding window is calculated in the following way: f. ofsp/fskWherein f isspFor sampling the sample data at a sampling frequency, fskFor shaking or flipping the frequency of shaking of the mobile device and calculating the average value v of the data sequence for each sliding windowi(ii) a When v isi>tiWhen t isiFor the set threshold, the sliding window is stopped with the starting point of the window set to P.
In some embodiments of the first aspect of the present invention, the interpolating the data sequence comprises: dividing the data sequence S into a plurality of subsequences D, performing data interpolation processing on each subsequence, smoothing data by using a smoothing window filter with adjustable window size, adjusting the value of window size omega by evaluating the size of the cross-correlation coefficient theta and a threshold value t, continuously iterating until the cross-correlation coefficient approaches the threshold value, and finishing the smoothing process.
In some embodiments of the first aspect of the present invention, the filtering, by using an infinite impulse response filter, the RSSI sequences of different frequency bands includes: dividing the whole frequency band into 16 sub-frequency bands by adopting an 1/2Octave method, combining three low-frequency sub-frequency bands into one sub-frequency band, splicing and cascading 14 sub-frequency bands into different granularities, and obtaining 105 frequency band samples with different lengths; these band samples are then filtered using an infinite impulse response filter.
In some embodiments of the first aspect of the present invention, the step S2 includes: and performing Fourier transform on the data sequence obtained in the step S1 to obtain a frequency band with active equipment shaking behavior, and performing normalization processing on the RSSI sequence of the frequency band to quantize the RSSI sequence into a bit sequence.
In some embodiments of the first aspect of the present invention, the calculation method of the active frequency band of the device shaking behavior is as follows: calculating the first k main components in the frequency domain after Fourier transform, and expressing the highest frequency of the components as fiDetermining the frequency band of the active shaking behavior of the equipment as [0, fi]At a sampling frequency of 2fiThe quantized data sequence is a bit sequence.
In some embodiments of the first aspect of the present invention, the calculating, in step S3, a key according to the bit sequence of each mobile device by using a hash coding method, and exchanging encryption messages between the mobile devices to verify consistency of mutual authentication includes: and for each mobile device, calculating the Hash verification code of the bit sequence of the mobile device, exchanging the Hash verification code with other devices, comparing the editing distance between the Hash verification code sequence generated by the mobile device and the received Hash verification code sequence by each mobile device, and determining whether the authentication is successful according to the relationship between the editing distance and the set threshold.
According to a second aspect of the present invention, there is provided a scientific research data privacy protection enhancement system facing a wireless network environment, including:
the data calibration module is used for establishing different posture and displacement change modes of the mobile equipment, detecting a starting point of equipment state change according to signal intensity change of a wireless network signal received by the mobile equipment from a wireless network signal emission source, and calibrating the received signal;
the data quantization module is used for quantizing the data sequence subjected to the calibration processing into a bit sequence;
and the key extraction module is used for calculating keys according to the bit sequence of each mobile device in a Hash coding mode, exchanging encryption messages among the mobile devices to verify the consistency of mutual authentication, generating unique and random symmetric keys and establishing complete connection.
The invention has the following beneficial effects: aiming at the anti-imitation mutual authentication of the mobile equipment, the invention provides a key generation framework based on a wireless network environment, which generates a unique and consistent symmetric key according to wireless network signals collected from the mobile equipment and realizes the identity authentication of multiple equipment. The method can effectively improve the privacy protection of research data in a wireless network environment.
Detailed Description
In order to facilitate understanding of those skilled in the art, the present invention will be further described with reference to the following examples and drawings, which are not intended to limit the present invention.
Referring to fig. 1 to 2, the present invention provides a bidirectional authentication and key generation framework under a wireless network, which forms a system for enhancing scientific research data privacy protection, and the system mainly includes the following functional modules: the device comprises a data calibration module, a quantization module and a key extraction module. The mobile device continuously receives wireless network signals transmitted by devices such as a gateway and a base station, and the mobile device includes, but is not limited to, an intelligent mobile terminal such as a smart phone, a smart band, a personal digital assistant, and a tablet computer. The user first shakes the devices in any manner, such as shaking or whipping, to create a shock. Upon detecting a shock event, each device begins sampling the user's behavior through the RSSI information of the wireless network signals. In the data calibration module, the device performs tracking synchronization and data interpolation processing on the sampled original data in a self-adaptive manner, so that the data can be effectively subjected to synchronous smooth processing, and the influence of track asynchronism caused by different positions of the device is reduced. In the quantization module, bit sequences are generated from the RSSI data, respectively, according to the sensitivity of the device to user behavior. In the key extraction module, devices exchange a limited number of encrypted messages with each other to verify the consistency of mutual authentication, and selectively use the consistent bits for key generation. In this way, the devices can generate a unique and consistent key through dithering.
Specifically, referring to fig. 3 to 4, the present invention is a scientific research data privacy protection enhancement method based on a wireless network environment, which is based on the above system, and includes the following steps:
the method comprises the steps of data calibration, wherein the mobile equipment continuously receives wireless network signals sent by equipment such as a gateway and a base station, the wireless network signals comprise wireless network signals such as WiFi signals and cellular network signals, the wireless network signals can sense the channel state change of the surrounding environment of the mobile equipment, the RSSI of the received signal strength of the wireless network signals is used as feedback of the wireless channel change, the RSSI sequence is subjected to numerical value abnormity detection, the RSSI characteristic value of the equipment with a vibration event is detected and is used as the starting point of the equipment posture or position change, the starting point of the equipment state change and the RSSI track are synchronized for a plurality of pieces of equipment, then the data sequence is subjected to interpolation processing, the track of the RSSI sequence is smoothed, and the RSSI sequences of different frequency bands are subjected to filtering processing by adopting an infinite impulse response filter;
a data quantization step, namely performing Fourier transform on the sequence to obtain a frequency band with active behaviors, performing normalization processing on an RSSI sequence of the frequency band, and quantizing the RSSI sequence into a bit sequence;
and a key extraction step, namely calculating the Hash verification code of the bit sequence by using the Hash verification code as a signature and exchanging the Hash verification code to the same-level equipment, and comparing the editing distances of the Hash verification code sequences of the multiple equipment to judge whether the authentication is successful.
Specifically, in the data calibration step, different change patterns of posture and displacement are established for the mobile device by performing the behavior of shaking or turning the mobile device; the RSSI sequence is subjected to numerical value anomaly detection by taking the received signal strength RSSI of a wireless network signal received by the mobile equipment as feedback for wireless channel change, the RSSI characteristic value of a vibration event of the mobile equipment is detected to be taken as the initial point of equipment posture or position change, and the initial points and tracks of a plurality of mobile equipment are synchronized; carrying out interpolation processing on the data sequence and smoothing the track of the RSSI sequence; and filtering the RSSI sequences of different frequency bands by adopting an infinite impulse response filter.
In one embodiment, synchronizing the starting points and trajectories of the plurality of mobile devices comprises: sliding a window along the original RSSI data sequence, wherein the size of the sliding window is calculated in the following way: f. ofsp/fskWherein f isspFor sampling the sample data at a sampling frequency, fskFor shaking or turning the mobile device, e.g. frequency f of shaking of the usersk10HZ, sampling frequency fsp100hz, window size fsp/fsk20; and calculating the average value v of the data sequence of each sliding windowi(ii) a Comparing the average value of the sliding window with a preset threshold value when v isi>tiWhen t isiFor the set threshold, the sliding window is stopped with the starting point of the window set to P.
In one embodiment, interpolating a data sequence comprises: dividing the data sequence S into a plurality of subsequences D, performing data interpolation processing on each subsequence, smoothing data by using a smoothing window filter with adjustable window size, adjusting the value of window size omega by evaluating the size of the cross-correlation coefficient theta and a threshold value t, continuously iterating until the cross-correlation coefficient approaches the threshold value, and finishing the smoothing process.
In one embodiment, the filtering the RSSI sequences of different frequency bands by using an infinite impulse response filter comprises: dividing the whole frequency band into 16 sub-frequency bands by adopting an 1/2Octave method, combining three low-frequency sub-frequency bands into one sub-frequency band, splicing and cascading 14 sub-frequency bands into different granularities, and obtaining 105 frequency band samples with different lengths; these band samples are then filtered using an infinite impulse response filter.
In the data quantization step, the data sequence obtained in the calibration step is subjected to Fourier transform to obtain a frequency band with active equipment shaking behavior, and then the RSSI sequence of the frequency band is subjected to normalization processing to quantize the RSSI sequence into a bit sequence.
In one embodiment, the calculation method of the active frequency band of the device shaking behavior is as follows: calculating the first k main components in the frequency domain after Fourier transform, and expressing the highest frequency of the components as fiDetermining the frequency band of the active shaking behavior of the equipment as [0, fi]At a sampling frequency of 2fiThe quantized data sequence is a bit sequence.
In the key extraction step, for each mobile device, a hash verification code of a bit sequence of the mobile device is calculated and exchanged to other devices, and each mobile device compares the editing distance between the hash verification code sequence generated by the mobile device and the received hash verification code sequence, and determines whether authentication is successful according to the relationship between the editing distance and a set threshold.
Referring to fig. 5, the method for calculating the hash verification code of the bit sequence includes:
1) initializing a sliding window W of a bit sequence S of a device A and a bit sequence S' of a device B, wherein the lengths of the two bit sequences are respectively expressed as lXAnd lYThe sliding window size is ω.
2) Respectively obtaining the bit strings M of the windows WiAnd Mi', generating a random number riAnd ri', i denotes window W index, call hash function HAMC (r)i,Mi) To obtain a bit string BiAnd Bi'。
3) And moving a window forwards on the sequences S and S' by taking 1 bit as a step length, and executing 2) operation to obtain all bit character strings of the corresponding sequences to form a bit character string sequence.
4) By means of broadcasting, device a sends a signal of length lXSequence of (a) X ═ ri||BiAnd (1 ≦ i ≦ l) for device B, l representing the length of the bit sequence.
5) By means of broadcasting, the device B sends a signal of length lYSequence of (a) Y ═ ri'||Bi' } (1 is less than or equal to i and less than or equal to l) is given to the equipment A.
6) Calculate the edit distance d between X and Y, and calculate B
iAnd B
iDegree of matching of `
7) If α < t, t represents a mutual authentication threshold, the mutual authentication partner device is an authorized device. Finding matching components B of X and Y based on bit sequence S and bit sequence S' of peer deviceiAnd Bi' calculating the next matching result to verify the consistency of the hash code of the bit sequence.
8) Calculating the edit distance d of S and S ', dividing them into a plurality of blocks, calculating the hash code M' of each block M, i.e. HAMC (r)iM), assuming that they are used as a bit sequence, the first K bits are extracted as a key K, and the key K is used for subsequent communication of the device to prevent interference of other attackers.
As a preferred embodiment, the sliding window for computing the hashed validation code is greater than 64 bits.
It should be understood that, the scientific research data privacy protection enhancement system for a wireless network environment provided in the embodiment of the present invention may implement all technical solutions in the method embodiments, functions of each functional module may be implemented specifically according to the method in the method embodiments, and specific implementation processes of each functional module that are not described in detail may refer to relevant descriptions in the method embodiments, and are not described in detail in the specification.
While the invention has been described in terms of its preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention.