Data interaction method based on Internet of things equipment acquisition
Technical Field
The invention relates to the field of service application of the Internet of things, in particular to a data interaction method based on equipment acquisition of the Internet of things.
Background
At present, with the rapid development of the application field of the internet of things and the rapid iterative innovation of the technology of the internet of things, the current situations that the number of communication devices is increased due to heterogeneous diversity of communication networks, the distribution range of the devices is more and more extensive, the expression forms of the collected data are various and the like are presented, and thus a serious challenge is brought to the information safety of the internet of things. Data interaction of the internet of things needs to ensure that a transmission link can safely send messages to a receiving end, and also needs to prevent the receiving end from being traced and attacked and data of the sending end from being tampered and transmitted. At present, the application field of the Internet of things lacks a full-link and full-flow integrated data security interaction method and application from an originating end to a final end.
With the rapid development of the internet of things and the rapid progress of science and technology, the gateway mode solves the problem of point-to-point single network communication of the traditional equipment, and enables multipoint sensing data to be converged to the gateway for unified processing, so that remote communication is realized.
Disclosure of Invention
Aiming at the problem that the application field of the Internet of things lacks a full-link and full-flow integrated data security interaction method from an initial end to a final end, the invention is matched with the communication network module interface capability of equipment such as a gateway and an intelligent terminal, applies a software development component to the equipment such as the gateway by relying on the advantages of an embedded technology, provides an integrated and comprehensive solution through soft and hard matching, and realizes that the equipment of the Internet of things can select a proper mode according to the network environment condition and transmit the data of the Internet of things to the most terminal information system of the Internet of things. The invention has good application prospect.
The invention defines a Software Development Kit (SDK) loaded on the Internet of things equipment to realize data acquisition, data encapsulation, data reporting and the like; according to the invention, the Internet of things data model is used for carrying out digital description on the Internet of things equipment entity, so that the Internet of things equipment can be identified by an Internet of things informatization system and can be subjected to processing such as function call; the method confirms the credibility of the equipment accessing to the Internet of things of the information system by a self-defined equipment identity card mechanism; the invention realizes the safe and high-efficiency data transmission and the like by using an improved encryption technology and matching with a self-defined protocol.
The invention discloses a data interaction method based on Internet of things equipment acquisition, which is realized by utilizing a gateway, the Internet of things equipment and an Internet of things informatization system, wherein the Internet of things informatization system is connected with the gateway, the Internet of things equipment is connected with the gateway, and the gateway, the Internet of things equipment and the Internet of things informatization system jointly form an Internet of things network. The Internet of things informatization system is used for receiving perception data acquired by various Internet of things devices, providing a unified informatization platform for collection, aggregation, processing, fusion and mining analysis of the perception data, and providing shared distribution service of the perception data. The Internet of things equipment comprises various sensors, and the gateway comprises a WAPI module, an Ethernet module, a ZigBee module, a serial port module, a LORA module, an LTE module, a 4G/5G module, a Beidou module and the like, and an NBIOT module and the like. The gateway is used for realizing data analysis on the heterogeneous network modules, enabling the data forwarding coordinators between the heterogeneous networks to exchange information with each other through the serial port modules of the gateway, reading and analyzing data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, providing the read data through the serial port modules of the gateway, analyzing the data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, storing the data into a database of the gateway, and repackaging and converting the data into a standardized format.
The gateway also comprises an Internet of things embedded software development component, the Internet of things embedded software development component is loaded in the gateway and used for realizing the rapid input of data into the Internet of things terminal, and the Internet of things embedded software development component provides an edge computing function, so that the gateway is supported to have random access and plug and play to a heterogeneous network environment. The Internet of things embedded software development component comprises a data model SDK, an encryption and decryption SDK, an edge computing SDK and the like, provides a standardized data transmission mode, and has the functions of data caching, data deduplication, data retransmission, data aggregation, data reporting, equipment control, standardized data format conversion and the like. The method comprises the following specific steps:
s1, defining an Internet of things data model;
the Internet of things data model is characterized in that after physical equipment is abstracted and modeled, sensing data of various Internet of things equipment is subjected to standard digital description, corresponding JSON format file data models are established for the various Internet of things equipment, and the Internet of things data models are stored in a JSON format in an Internet of things informatization system; the data model of the internet of things defines a set of corresponding standard data parameters for each type of internet of things equipment, and the standard data parameters comprise all parameters used by the type of internet of things equipment. Specifically, the internet of things informatization system abstracts the functions of various internet of things equipment into data parameters consisting of attributes, functions, events and extensions by using the internet of things data model, and the data parameters are used for data interaction between the various internet of things equipment and the internet of things informatization system; and the attribute in the data parameter is used for describing the running state of the equipment of the Internet of things. The information system of the internet of things actively sends messages to obtain the attributes of the devices of the internet of things, and the devices of the internet of things report the attributes to the information system of the internet of things through events.
The functions in the data parameters record the capability or method of the internet of things equipment which can be called externally, and the settable input parameters and output parameters of the internet of things equipment, and are the basis of the internet of things informatization system for executing certain linkage and other task control function instructions on the internet of things equipment.
The event in the data parameters records an event occurring when the internet of things equipment runs, and the event comprises notification information which needs to be sensed and processed externally and comprises a plurality of output parameters.
The expansion in the data parameters records the self-defined expansion fields such as the device tags and the like, and is used for realizing information sharing.
The same data model is adopted by the same type of Internet of things equipment by the Internet of things data model, the same type of Internet of things equipment is defined by the Internet of things data model, and data of the same type of Internet of things equipment is standardized, so that the same type of Internet of things equipment can be automatically identified by an Internet of things information system and analyzed and configured after being accessed into the Internet of things, and the workload of artificial configuration is reduced. The Internet of things informatization system forms a standardized service pool or resource pool by using the Internet of things data model, and the Internet of things informatization system acquires data resources or service resources of different types of Internet of things equipment by using the service pool or resource pool.
The data model of the Internet of things has abnormal data processing capacity and can shield data which can cause misoperation of the Internet of things equipment, specifically, a controlled range and a boundary range are defined in the attribute of data parameters of the data model of the Internet of things, when the trigger event information value of the Internet of things equipment is in the boundary range, a trigger event takes the generated time as a timestamp to carry out data marking, and the trigger event information value of the Internet of things equipment is sent to an Internet of things informatization system; when the value of the trigger event information value of the Internet of things equipment is out of the boundary range, the Internet of things data model directly takes the data as dirty data, adds a shielding label to the data, and feeds back shielding label information to the Internet of things informatization system.
S2, identity authentication is carried out on the Internet of things equipment;
identity authentication is carried out on the Internet of things equipment, the credibility of the Internet of things equipment accessed to the Internet of things terminal is guaranteed, and the Internet of things equipment which does not pass the identity authentication cannot be accessed to the Internet of things terminal. For all the internet of things equipment needing to be accessed to the internet of things information system for information interaction, the internet of things information system needs to register the equipment, and the internet of things information system allocates equipment ID for each piece of internet of things equipment needing to be accessed to the internet of things information system and activates the equipment, so that the equipment can carry out conversation with the internet of things information system.
Step S2, using the device ID as an identity tag of the internet of things device, where each internet of things device has an independent device ID; the equipment of the Internet of things applies for activation to the information system of the Internet of things, and sends equipment information including manufacturers, production batches, production passwords, chip unique codes and the like to the information system of the Internet of things. And the Internet of things informatization system judges and generates a unique equipment ID according to the equipment information through activation. The Internet of things informatization system informs the Internet of things equipment of successful activation, and issues equipment codes, equipment keys, digital certificates and the like to the Internet of things equipment, and the Internet of things equipment permanently stores the standby ID of the Internet of things equipment. If the internet of things equipment is activated for multiple times, the equipment key and the digital certificate of the internet of things equipment must be changed after each activation, and the equipment ID is kept unchanged. After the internet of things equipment is activated, when the internet of things equipment is connected with an internet of things information system every time, the equipment ID is submitted, an equipment key is used for encrypting a random number, and information to be sent to the internet of things information system is mixed with the encrypted random number and then sent to prevent the information from being intercepted and stolen.
For the device to interact with the platform, an information mechanism needs to be adopted for the device identity each time the device is reconnected. Identity authentication is carried out on the Internet of things equipment by adopting a behavior-based trust mechanism, the credibility of the Internet of things equipment is dynamically judged according to the behavior history record of the Internet of things equipment and the current behavior characteristics of the Internet of things equipment, the equipment ID, the Internet of things data model, digital signature information, an intelligent card or an encryption chip of the equipment or other identity authentication attribute information (secret information is stored in the intelligent card and can be an encrypted file of a user password or a random number) is used as a trust certificate and is compared with related information in a database containing identity authentication rule information of an Internet of things informatization system, and trust evaluation is output through a trust management engine of the Internet of things informatization system.
The method for calculating the trust evaluation of the trust management engine on certain Internet of things equipment comprises the following steps:
HX=α*TB-β*TM+γ*TQ+k*Tt,
wherein HXTrust evaluation value T representing certain Internet of things equipmentB、TM、TQ、TtRespectively representing the equipment ID, the data model of the Internet of things, the digital signature and the trust degree of the attribute information of the identification of the equipment per se, TB、TM、TQ、TtAll values of (A) are not more than 1, and alpha, beta, gamma and k are respectively TB、TM、TQ、TtIs 1, while the internet of things device itself isWhen the smart card or the cryptographic chip or other identification attribute information is absent, k is 0.
TB、TM、TQ、TtThe calculation of (2) adopts a judgment value method or a maximum possible value method. For the evaluation method, TBHas a judgment value of 0 or 1, TMThe judgment value of (A) is related to the number of times of deleting abnormal dirty data in unit time of the data model of the Internet of things, TQ、TtThe evaluation value of (a) is defined according to the evaluation requirement.
For the maximum possible value method, which utilizes the maximum likelihood estimation method MLE, when the confidence probability distribution function is known and the parameters of the probability distribution are unknown, the MLE infers the unknown probability distribution parameters from the obtained confidence results, and the inferred probability distribution parameters maximize the probability of the obtained confidence results. The reliability of the ith Internet of things equipment is tiThe probability that the ith Internet of things equipment passes the identity authentication is equal to the credibility of the ith Internet of things equipment, and the verification result of the ith Internet of things equipment on the kth Internet of things equipment is xi,kAnd recording adjacent equipment of the ith Internet of things equipment as n (i), and solving by using an MLE (maximum likelihood analysis) method to obtain a trust probability distribution function p (x)i,k,ti,lk) The parameter at which the maximum value is taken, i.e.
Solving for t at which the above equation is maximizediI.e. the calculation result of the credibility of the equipment ID, the Internet of things data model, the digital signature or the identity certificate attribute information of the equipment of the ith Internet of things equipment, wherein N is the number of the physical network equipment, and l is the number of the physical network equipmentkTaking the initial trust degree estimated value of the kth Internet of things equipment as one of the initial trust degree estimated values of equipment ID, an Internet of things data model, a digital signature or equipment identity certificate attribute information according to the lkInitial estimate of the specific confidence taken, tiI.e. the result of the calculation of the corresponding confidence level. For example, |kFor the kth station internet of thingsInitial estimate of confidence level of device ID of device, tiThe confidence level of the device ID of the ith Internet of things device is calculated.
S3, encrypting and transmitting the data;
the method specifically comprises the steps that in the data transmission process, a receiver sends a public key of the receiver to a sender, encrypts a key of a symmetric encryption algorithm by using the public key of the sender, sends the encrypted key of the symmetric encryption algorithm to the receiver, decrypts the received key by using an own private key to obtain the key of the symmetric encryption method, then the sender sends original information encrypted by using the own private key to the receiver, and the receiver decrypts the received information by using the key of the symmetric encryption algorithm.
In the information transmission process between the Internet of things equipment or the Internet of things informatization system, the transmitted information is digitally signed to prove the identity of the information, the transmitted information is signed and authenticated by utilizing an improved asymmetric encryption algorithm, the identity of a private key owner is verified by a public key, the information is confirmed to be signed and sent by an information sender through the digital signature, the summary information of the transmitted information is encrypted by using a private key of the sender in the signature authentication process, then the encrypted ciphertext and the unencrypted original text are transmitted to an information receiver, the encrypted summary information is decrypted by the public key of the sender by the receiver, then the decrypted summary information is decrypted by using a summary information encryption method the same as that of the sender, and the obtained summary information is compared with the original summary information of the transmitted information, if the information is the same, the received information is complete and is not tampered by a third party in the transmission process. The method comprises the steps that the Internet of things equipment performs registration authentication on an Internet of things concept informatization system and performs authorization authentication through the Internet of things informatization system, a certificate management system in the Internet of things informatization system generates 2 pairs of keys, one pair of keys is used for a private key and a public key of an asymmetric encryption method, the other pair of keys is used for a symmetric encryption method, and meanwhile, a digital certificate is generated and fed back to the Internet of things equipment.
S4, defining the application layer protocol;
the data interaction between the Internet of things equipment and the Internet of things information system is carried out through an application layer protocol, the adopted application layer protocol comprises MQTT, COAP, HTTP, MIT-LINK protocol and the like, and parameters of the application layer protocol MIT-LINK are redefined according to data interaction requirements. The MIT-Link protocol is a message transmission protocol of a request/distribution mode of a client/server architecture, the MIT-Link protocol adopts a request/response model, the Internet of things equipment sends a request message to the Internet of things information system, the request message comprises a request type, a protocol name and a version, an Internet of things equipment identifier and request data, the Internet of things information system sends a response message to the Internet of things equipment after receiving the request message, and the response message comprises a response type, a protocol name and a version, a reason code and response data; specifically, the Internet of things equipment is connected to the Internet of things informatization system and sends a connection request message. The Internet of things informatization system receives the connection request, sends a response message and establishes a TCP socket connection; the Internet of things equipment sends an operation request message, the Internet of things information system receives the operation request message and returns a response message, the Internet of things equipment sends a connection closing request message, and the Internet of things information system receives the connection closing request message and releases TCP connection.
The message of the MIT-Link protocol comprises a message header and a message body, wherein the message header comprises: the message type, protocol name, protocol version, connection mark, connection maintaining time and message body length, wherein the message body comprises: device ID, message data.
S5, adopting a data access stability maintaining mechanism;
when a plurality of internet of things devices simultaneously initiate a network access operation process, message collision is generated at a gateway by an initiated network access application, so that the plurality of internet of things devices cannot normally join a network, the internet of things devices adopt a monitoring mechanism and a rule engine mechanism, the internet of things devices firstly randomly retreat for a period of time and monitor the busy and idle state of the network in the network access operation process, if the current network channel is in the idle state, the internet of things devices initiate the network access operation, and if the current network channel is in the busy state, the internet of things devices wait for the next network access time slot to carry out the network access operation. According to the operation, the network access process of all the Internet of things equipment is realized.
The invention has the beneficial effects that:
the invention provides an integrated and comprehensive solution by matching with communication network module interface capabilities of devices such as a gateway and an intelligent terminal and applying a software development component to the devices such as the gateway and the like by relying on the advantages of an embedded technology, and realizes that the devices of the Internet of things can select a proper mode according to the network environment condition and transmit the data of the Internet of things to the most terminal information system of the Internet of things. The invention has good application prospect.
Drawings
FIG. 1 is a flow chart of an implementation of the method of the present invention;
FIG. 2 is a diagram of a data flow to architecture design of the method of the present invention;
FIG. 3 is a flowchart of the device identity trust authentication method of the present invention;
FIG. 4 is a flow chart of the attribute reporting of the data model of the Internet of things according to the method of the invention;
fig. 5 is a definition diagram of the attribute rule of the data model of the internet of things according to the method of the invention.
Detailed Description
For a better understanding of the present disclosure, an example is given here.
The invention defines a Software Development Kit (SDK) loaded on the Internet of things equipment to realize data acquisition, data encapsulation, data reporting and the like; according to the invention, the Internet of things data model is used for carrying out digital description on the Internet of things equipment entity, so that the Internet of things equipment can be identified by an Internet of things informatization system and can be subjected to processing such as function call; the method confirms the credibility of the equipment accessing to the Internet of things of the information system by a self-defined equipment identity card mechanism; the invention realizes the safe and high-efficiency data transmission and the like by using an improved encryption technology and matching with a self-defined protocol. The architecture relationship of the implementation of the invention is shown in figure 1. The data flow architecture design is as shown in fig. 2. Fig. 3 is a flowchart of the authentication process of the device identity trust of the method of the present invention. Fig. 4 is a process diagram of reporting attributes of the data model of the internet of things according to the method of the present invention. Fig. 5 is a definition diagram of the attribute rule of the data model of the internet of things according to the method of the invention.
The invention discloses a data interaction method based on Internet of things equipment acquisition, which is realized by utilizing a gateway, the Internet of things equipment and an Internet of things informatization system, wherein the Internet of things informatization system is connected with the gateway, the Internet of things equipment is connected with the gateway, and the gateway, the Internet of things equipment and the Internet of things informatization system jointly form an Internet of things network. The Internet of things informatization system is used for receiving perception data acquired by various Internet of things devices, providing a unified informatization platform for collection, aggregation, processing, fusion and mining analysis of the perception data, and providing shared distribution service of the perception data. The Internet of things equipment comprises various sensors, and the gateway comprises a WAPI module, an Ethernet module, a ZigBee module, a serial port module, a LORA module, an LTE module, a 4G/5G module, a Beidou module and the like, and an NBIOT module and the like. The gateway is used for realizing data analysis on the heterogeneous network modules, enabling the data forwarding coordinators between the heterogeneous networks to exchange information with each other through the serial port modules of the gateway, reading and analyzing data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, providing the read data through the serial port modules of the gateway, analyzing the data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, storing the data into a database of the gateway, and repackaging and converting the data into a standardized format.
The gateway also comprises an Internet of things embedded software development component, the Internet of things embedded software development component is loaded in the gateway and used for realizing the rapid input of data into the Internet of things terminal, and the Internet of things embedded software development component provides an edge computing function, so that the gateway is supported to have random access and plug and play to a heterogeneous network environment. The Internet of things embedded software development component comprises a data model SDK, an encryption and decryption SDK, an edge computing SDK and the like, provides a standardized data transmission mode, and has the functions of data caching, data deduplication, data retransmission, data aggregation, data reporting, equipment control, standardized data format conversion and the like. The SDK has the greatest characteristic of being capable of cutting and packaging according to the storage space of the internet of things equipment, being capable of adjusting the process sequence according to the size of the storage space and the transmission requirement, and being suitable for the equipment scene with the small packaging requirement of the code.
The method comprises the following specific steps:
s1, defining an Internet of things data model;
the Internet of things data model is characterized in that after physical equipment is abstracted and modeled, sensing data of various Internet of things equipment is subjected to standard digital description, corresponding JSON format file data models are established for the various Internet of things equipment, and the Internet of things data models are stored in a JSON format in an Internet of things informatization system; based on the data model of the Internet of things, the application development of the Internet of things can be directly carried out. The data model of the internet of things defines a set of corresponding standard data parameters for each type of internet of things equipment, and the standard data parameters comprise all parameters used by the type of internet of things equipment. Specifically, the internet of things informatization system abstracts the functions of various internet of things equipment into data parameters consisting of attributes, functions, events and extensions by using the internet of things data model, and the data parameters are used for data interaction between the various internet of things equipment and the internet of things informatization system; and the attribute of the data parameter is used for describing the running state of the equipment of the Internet of things. The information system of the internet of things actively sends messages to obtain the attributes of the devices of the internet of things, and the devices of the internet of things report the attributes to the information system of the internet of things through events.
The data parameter function records the capability or method of the internet of things equipment which can be called externally, and the settable input parameter and output parameter of the internet of things equipment, and is the basis of the internet of things informatization system for executing a certain linkage and other task control function instructions on the internet of things equipment.
The event of the data parameter records an event occurring when the internet of things equipment runs, and the event comprises notification information which needs to be sensed and processed externally and comprises a plurality of output parameters.
The expansion of the data parameters records the self-defined expansion fields such as the device labels and the like, and is used for realizing information sharing.
The same data model is adopted by the same type of Internet of things equipment by the Internet of things data model, the same type of Internet of things equipment is defined by the Internet of things data model, and data of the same type of Internet of things equipment is standardized, so that the same type of Internet of things equipment can be automatically identified by an Internet of things information system and analyzed and configured after being accessed into the Internet of things, and the workload of artificial configuration is reduced. The Internet of things informatization system forms a standardized service pool or resource pool by using the Internet of things data model, and the Internet of things informatization system acquires data resources or service resources of different types of Internet of things equipment by using the service pool or resource pool.
The design element fields contained in the data model of the Internet of things can be customized by a user, data types and unit customization are supported, and the data model of the Internet of things has the characteristics of convenience and flexibility. The data model of the Internet of things has abnormal data processing capacity and can shield data which can cause misoperation of the Internet of things equipment, specifically, a controlled range and a boundary range are defined in the attribute of data parameters of the data model of the Internet of things, when the trigger event information value of the Internet of things equipment is in the boundary range, a trigger event takes the generated time as a timestamp to carry out data marking, and the trigger event information value of the Internet of things equipment is sent to an Internet of things informatization system; when the value of the trigger event information value of the Internet of things equipment is out of the boundary range, the Internet of things data model directly takes the data as dirty data, adds a shielding label to the data, and feeds back shielding label information to the Internet of things informatization system.
S2, identity authentication is carried out on the Internet of things equipment;
the application service of the Internet of things has the characteristics of more access devices and wide distribution region, so the possibility of falsely using and falsely modifying the equipment of the Internet of things exists. Identity authentication is carried out on the Internet of things equipment, the credibility of the Internet of things equipment accessed to the Internet of things terminal is guaranteed, and the Internet of things equipment which does not pass the identity authentication cannot be accessed to the Internet of things terminal. For all the internet of things equipment needing to be accessed to the internet of things information system for information interaction, the internet of things information system needs to register the equipment, and the internet of things information system allocates equipment ID for each piece of internet of things equipment needing to be accessed to the internet of things information system and activates the equipment, so that the equipment can carry out conversation with the internet of things information system.
Step S2, using the device ID as an identity tag of the internet of things device, where each internet of things device has an independent device ID; the equipment of the Internet of things applies for activation to the information system of the Internet of things, and sends equipment information including manufacturers, production batches, production passwords, chip unique codes and the like to the information system of the Internet of things. And the Internet of things informatization system judges and generates a unique equipment ID according to the equipment information through activation. The Internet of things informatization system informs the Internet of things equipment of successful activation, and issues equipment codes, equipment keys, digital certificates and the like to the Internet of things equipment, and the Internet of things equipment permanently stores the standby ID of the Internet of things equipment. If the internet of things equipment is activated for multiple times, the equipment key and the digital certificate of the internet of things equipment must be changed after each activation, and the equipment ID is kept unchanged. After the internet of things equipment is activated, when the internet of things equipment is connected with an internet of things information system every time, the equipment ID is submitted, an equipment key is used for encrypting a random number, and information to be sent to the internet of things information system is mixed with the encrypted random number and then sent to prevent the information from being intercepted and stolen.
For the device to interact with the platform, an information mechanism needs to be adopted for the device identity each time the device is reconnected. Identity authentication is performed on the internet of things equipment by adopting a behavior-based trust mechanism, the credibility of the internet of things equipment is dynamically judged according to the behavior history record of the internet of things equipment and the current behavior characteristics of the internet of things equipment, the equipment ID, the internet of things data model, digital signature information, an intelligent card or an encryption chip of the equipment or other identity authentication attribute information (secret information is stored in the intelligent card and can be an encrypted file of a user password or a random number) is used as a trust certificate and is compared with related information in a database containing identity authentication rule information of an internet of things informatization system, and trust evaluation is output through a trust management engine of the internet of things informatization system, as shown in figure 4.
The method for calculating the trust evaluation of the trust management engine on certain Internet of things equipment comprises the following steps:
HX=α*TB-β*TM+γ*TQ+k*Tt,
wherein HXTrust evaluation value T representing certain Internet of things equipmentB、TM、TQ、TtRespectively representing the equipment ID, the data model of the Internet of things, the digital signature and the trust degree of the attribute information of the identification of the equipment per se, TB、TM、TQ、TtAll values of (A) are not more than 1, and alpha, beta, gamma and k are respectively TB、TM、TQ、TtThe sum of the weighting parameters is 1, and when the smart card or the encryption chip of the internet of things device itself or other identification attribute information is absent, k is 0. The values of the alpha, beta, gamma and k parameters can provide two sets of parameter value results according to the existence of the smart card or an encryption chip of the device or other identification attribute information (secret information is stored in the smart card).
TB、TM、TQ、TtThe calculation of (2) adopts a judgment value method or a maximum possible value method. For the evaluation method, TBHas a judgment value of 0 or 1, TMThe judgment value of (A) is related to the number of times of deleting abnormal dirty data in unit time of the data model of the Internet of things, TQ、TtThe evaluation value of (a) is defined according to the evaluation requirement.
For the maximum possible value method, the maximum likelihood estimation method MLE is utilized, the maximum likelihood estimation Method (MLE) is a trust inference method based on probability, and is suitable for a probability model and a belief model, under the condition that a trust probability distribution function is known and the parameters of probability distribution are unknown, the MLE infers unknown probability distribution parameters according to the obtained trust result, and the inferred probability distribution parameters enable the probability of the obtained trust result to be maximum. The reliability of the ith Internet of things equipment is tiThe probability that the ith Internet of things equipment passes the identity authentication is equal to the credibility of the ith Internet of things equipment, and the verification result of the ith Internet of things equipment on the kth Internet of things equipment is xi,kAnd recording adjacent equipment of the ith Internet of things equipment as n (i), and solving by using an MLE (maximum likelihood analysis) method to obtain a trust probability distribution function p (x)i,k,ti,lk) The parameter at which the maximum value is taken, i.e.
Solving for t at which the above equation is maximizediI.e. the calculation result of the credibility of the equipment ID, the Internet of things data model, the digital signature or the identity certificate attribute information of the equipment of the ith Internet of things equipment, wherein N is the number of the physical network equipment, and l is the number of the physical network equipmentkTaking the initial trust degree estimated value of the kth Internet of things equipment as one of the initial trust degree estimated values of equipment ID, an Internet of things data model, a digital signature or equipment identity certificate attribute information according to the lkInitial estimate of the specific confidence taken, tiI.e. the result of the calculation of the corresponding confidence level. For example, |kWhen the confidence level is an initial estimated value of the equipment ID of the kth Internet of things equipmentiThe confidence level of the device ID of the ith Internet of things device is calculated.
S3, encrypting and transmitting the data;
and carrying out encryption transmission on the data by using an encryption algorithm of a digital certificate mechanism, and sending the data to a destination by adopting an encryption transmission technology. The invention improves the prior art, ensures the safe transmission of data (information is not tampered, not monitored and the like) and simultaneously improves the speed efficiency of encryption and decryption.
The data sent by the Internet of things equipment is guaranteed not to be intercepted by adopting a key encryption mode, and the key encryption mode comprises a symmetric encryption algorithm and an asymmetric encryption algorithm. The symmetric encryption algorithm has high possibility of password leakage, and the efficiency of the asymmetric encryption algorithm is very low. The method specifically comprises the steps that in the data transmission process, a receiver sends a public key of the receiver to a sender, encrypts a secret key of a symmetric encryption algorithm by using the public key of the sender, sends the encrypted secret key of the symmetric encryption algorithm to a receiver, decrypts the received secret key by using an own private key to obtain the secret key of a symmetric encryption method, sends original information encrypted by using the own private key to the receiver, and decrypts the received information by using the secret key of the symmetric encryption algorithm.
The method comprises the steps that the information transmitted by the information transmission device is subjected to digital signature to prove the identity of the information, signature authentication is carried out on the transmitted information by utilizing an improved asymmetric encryption algorithm, the identity of a private key owner is verified through a public key, the information is confirmed to be signed and sent by an information sender through digital signature, and other people cannot forge the signature of the information sender at all because other people do not have the private key of the information sender. The signature authentication process comprehensively uses an asymmetric encryption method and a digital digest method, the signature authentication process encrypts digest information of transmitted information by using a private key of a sender, then transmits the encrypted ciphertext and unencrypted original text to a receiver of the information, the receiver decrypts the encrypted digest information by using a public key of the sender, then decrypts the decrypted digest information by using a digest information encryption method the same as that of the sender, compares the obtained digest information with the original digest information of the transmitted information, and if the obtained digest information is the same as that of the sender, the received information is complete and is not tampered by a third party in the transmission process. Specifically, a hash value is obtained by performing a hash calculation on the information, and when the information is sent out, the hash value is encrypted and then is sent out together with the information as a signature. After receiving the message, the receiver recalculates the hash value of the message, compares the hash value with the hash value attached to the message (after decryption), and if the hash value is consistent with the hash value attached to the message, the receiver indicates that the content of the message is not modified. The digital signature is intercepted and imitated, so that people who are not good will modify the hash value while modifying the information content, so that the information content and the hash value can be matched. Therefore, the scheme of the invention is as follows: the method comprises the steps that the Internet of things equipment performs registration authentication on an Internet of things concept informatization system and performs authorization authentication through the Internet of things informatization system, a certificate management system in the Internet of things informatization system generates 2 pairs of keys, one pair of keys is used for a private key and a public key of an asymmetric encryption method, the other pair of keys is used for a symmetric encryption method, and meanwhile, a digital certificate (comprising an equipment signature and the public key) is generated and fed back to the Internet of things equipment. The digital certificate defined by the present invention contains certificate information fields as described in table 1.
TABLE 1 certificate information field
S4, defining the application layer protocol;
the Internet of things equipment and the Internet of things information system carry out data interaction through an application layer protocol, the adopted application layer protocol comprises MQTT, COAP, HTTP, MIT-LINK protocol and the like, parameters of the application layer protocol MIT-LINK are redefined according to data interaction requirements, and the application layer protocol can be well matched with an encryption technology to provide a safe and credible channel. The MIT-LINK protocol is a message transmission protocol of a request/distribution mode of a client/server architecture, and has the characteristics of lightness, standardization and the like aiming at an application protocol set by the Internet of things. And the MIT-LINK supports functions of long connection, real-time communication, offline feedback mechanism and the like. MIT-LINK is applicable to low-power consumption, low-storage, narrow-bandwidth application scenarios. The MIT-Link protocol defines how the client and server communicate. The MIT-Link protocol adopts a request/response model, the Internet of things equipment sends a request message to the Internet of things information system, the request message comprises the type, the protocol name and the version of the request, the identifier of the Internet of things equipment and request data, the Internet of things information system sends a response message to the Internet of things equipment after receiving the request message, and the response message comprises the type, the protocol name and the version, a reason code and response data of the response; specifically, the Internet of things equipment is connected to the Internet of things informatization system and sends a connection request message. The Internet of things informatization system receives the connection request, sends a response message and establishes a TCP socket connection; the Internet of things equipment sends an operation request message, the Internet of things information system receives the operation request message and returns a response message, the Internet of things equipment sends a connection closing request message, and the Internet of things information system receives the connection closing request message and releases TCP connection.
The message of the MIT-Link protocol comprises a message header and a message body, wherein the message header comprises: the message type, protocol name, protocol version, connection mark, connection maintaining time and message body length, wherein the message body comprises: device ID, message data.
S5, adopting a data access stability maintaining mechanism;
aiming at performance requirements (including real-time data processing capacity and transmission rate) of simultaneous access of heterogeneous networks of the Internet of things equipment, the Internet of things informatization system adopts a load balancing strategy, a resource allocation mechanism and the like, and improves the data link communication capacity of the Internet of things equipment so as to meet application requirements. For the case of simultaneous access of heterogeneous networks, when the internet of things device moves to an overlapping area covered by multiple networks simultaneously, the multiple networks are accessed simultaneously according to the data chain communication system equipped by the internet of things device.
When a plurality of internet of things devices simultaneously initiate a network access operation process, message collision is generated at a gateway by the initiated network access application, so that the plurality of internet of things devices cannot normally join a network, the internet of things devices adopt a monitoring mechanism and a rule engine mechanism, no matter an active network access mode or a passive network access mode is adopted, the internet of things devices firstly randomly retreat for a period of time and monitor the busy and idle state of the network in the network access operation process, if the current network channel is in the idle state, the internet of things devices initiate the network access operation, and if the current network channel is in the busy state, the next network access time slot is waited for network access operation. According to the operation, the network access process of all the Internet of things equipment is realized.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.