CN113765713A - Data interaction method based on Internet of things equipment acquisition - Google Patents

Data interaction method based on Internet of things equipment acquisition Download PDF

Info

Publication number
CN113765713A
CN113765713A CN202110997397.6A CN202110997397A CN113765713A CN 113765713 A CN113765713 A CN 113765713A CN 202110997397 A CN202110997397 A CN 202110997397A CN 113765713 A CN113765713 A CN 113765713A
Authority
CN
China
Prior art keywords
internet
things
equipment
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110997397.6A
Other languages
Chinese (zh)
Other versions
CN113765713B (en
Inventor
夏文祥
蓝士斌
和斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
School Of Military Management National Defense University Of People's Liberation Army Of China
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110997397.6A priority Critical patent/CN113765713B/en
Publication of CN113765713A publication Critical patent/CN113765713A/en
Application granted granted Critical
Publication of CN113765713B publication Critical patent/CN113765713B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0843Configuration by using pre-existing information, e.g. using templates or copying from other elements based on generic templates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a data interaction method based on Internet of things equipment acquisition, which is realized by utilizing a gateway, Internet of things equipment and an Internet of things informatization system, wherein the Internet of things informatization system is connected with the gateway; the system comprises an Internet of things informatization system, a data processing system and a data processing system, wherein the Internet of things informatization system is used for receiving sensing data acquired by various Internet of things devices, providing a uniform informatization platform for acquisition, aggregation, processing, fusion and mining analysis of the sensing data, and providing shared distribution service of the sensing data; the gateway is used for realizing data analysis of the heterogeneous network modules, so that the data forwarding coordinators between the heterogeneous networks exchange information with each other through the serial port modules of the gateway. The invention realizes that the Internet of things equipment can select a proper mode according to the network environment condition by matching with the communication network module interface capability of the gateway, the intelligent terminal and other equipment.

Description

Data interaction method based on Internet of things equipment acquisition
Technical Field
The invention relates to the field of service application of the Internet of things, in particular to a data interaction method based on equipment acquisition of the Internet of things.
Background
At present, with the rapid development of the application field of the internet of things and the rapid iterative innovation of the technology of the internet of things, the current situations that the number of communication devices is increased due to heterogeneous diversity of communication networks, the distribution range of the devices is more and more extensive, the expression forms of the collected data are various and the like are presented, and thus a serious challenge is brought to the information safety of the internet of things. Data interaction of the internet of things needs to ensure that a transmission link can safely send messages to a receiving end, and also needs to prevent the receiving end from being traced and attacked and data of the sending end from being tampered and transmitted. At present, the application field of the Internet of things lacks a full-link and full-flow integrated data security interaction method and application from an originating end to a final end.
With the rapid development of the internet of things and the rapid progress of science and technology, the gateway mode solves the problem of point-to-point single network communication of the traditional equipment, and enables multipoint sensing data to be converged to the gateway for unified processing, so that remote communication is realized.
Disclosure of Invention
Aiming at the problem that the application field of the Internet of things lacks a full-link and full-flow integrated data security interaction method from an initial end to a final end, the invention is matched with the communication network module interface capability of equipment such as a gateway and an intelligent terminal, applies a software development component to the equipment such as the gateway by relying on the advantages of an embedded technology, provides an integrated and comprehensive solution through soft and hard matching, and realizes that the equipment of the Internet of things can select a proper mode according to the network environment condition and transmit the data of the Internet of things to the most terminal information system of the Internet of things. The invention has good application prospect.
The invention defines a Software Development Kit (SDK) loaded on the Internet of things equipment to realize data acquisition, data encapsulation, data reporting and the like; according to the invention, the Internet of things data model is used for carrying out digital description on the Internet of things equipment entity, so that the Internet of things equipment can be identified by an Internet of things informatization system and can be subjected to processing such as function call; the method confirms the credibility of the equipment accessing to the Internet of things of the information system by a self-defined equipment identity card mechanism; the invention realizes the safe and high-efficiency data transmission and the like by using an improved encryption technology and matching with a self-defined protocol.
The invention discloses a data interaction method based on Internet of things equipment acquisition, which is realized by utilizing a gateway, the Internet of things equipment and an Internet of things informatization system, wherein the Internet of things informatization system is connected with the gateway, the Internet of things equipment is connected with the gateway, and the gateway, the Internet of things equipment and the Internet of things informatization system jointly form an Internet of things network. The Internet of things informatization system is used for receiving perception data acquired by various Internet of things devices, providing a unified informatization platform for collection, aggregation, processing, fusion and mining analysis of the perception data, and providing shared distribution service of the perception data. The Internet of things equipment comprises various sensors, and the gateway comprises a WAPI module, an Ethernet module, a ZigBee module, a serial port module, a LORA module, an LTE module, a 4G/5G module, a Beidou module and the like, and an NBIOT module and the like. The gateway is used for realizing data analysis on the heterogeneous network modules, enabling the data forwarding coordinators between the heterogeneous networks to exchange information with each other through the serial port modules of the gateway, reading and analyzing data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, providing the read data through the serial port modules of the gateway, analyzing the data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, storing the data into a database of the gateway, and repackaging and converting the data into a standardized format.
The gateway also comprises an Internet of things embedded software development component, the Internet of things embedded software development component is loaded in the gateway and used for realizing the rapid input of data into the Internet of things terminal, and the Internet of things embedded software development component provides an edge computing function, so that the gateway is supported to have random access and plug and play to a heterogeneous network environment. The Internet of things embedded software development component comprises a data model SDK, an encryption and decryption SDK, an edge computing SDK and the like, provides a standardized data transmission mode, and has the functions of data caching, data deduplication, data retransmission, data aggregation, data reporting, equipment control, standardized data format conversion and the like. The method comprises the following specific steps:
s1, defining an Internet of things data model;
the Internet of things data model is characterized in that after physical equipment is abstracted and modeled, sensing data of various Internet of things equipment is subjected to standard digital description, corresponding JSON format file data models are established for the various Internet of things equipment, and the Internet of things data models are stored in a JSON format in an Internet of things informatization system; the data model of the internet of things defines a set of corresponding standard data parameters for each type of internet of things equipment, and the standard data parameters comprise all parameters used by the type of internet of things equipment. Specifically, the internet of things informatization system abstracts the functions of various internet of things equipment into data parameters consisting of attributes, functions, events and extensions by using the internet of things data model, and the data parameters are used for data interaction between the various internet of things equipment and the internet of things informatization system; and the attribute in the data parameter is used for describing the running state of the equipment of the Internet of things. The information system of the internet of things actively sends messages to obtain the attributes of the devices of the internet of things, and the devices of the internet of things report the attributes to the information system of the internet of things through events.
The functions in the data parameters record the capability or method of the internet of things equipment which can be called externally, and the settable input parameters and output parameters of the internet of things equipment, and are the basis of the internet of things informatization system for executing certain linkage and other task control function instructions on the internet of things equipment.
The event in the data parameters records an event occurring when the internet of things equipment runs, and the event comprises notification information which needs to be sensed and processed externally and comprises a plurality of output parameters.
The expansion in the data parameters records the self-defined expansion fields such as the device tags and the like, and is used for realizing information sharing.
The same data model is adopted by the same type of Internet of things equipment by the Internet of things data model, the same type of Internet of things equipment is defined by the Internet of things data model, and data of the same type of Internet of things equipment is standardized, so that the same type of Internet of things equipment can be automatically identified by an Internet of things information system and analyzed and configured after being accessed into the Internet of things, and the workload of artificial configuration is reduced. The Internet of things informatization system forms a standardized service pool or resource pool by using the Internet of things data model, and the Internet of things informatization system acquires data resources or service resources of different types of Internet of things equipment by using the service pool or resource pool.
The data model of the Internet of things has abnormal data processing capacity and can shield data which can cause misoperation of the Internet of things equipment, specifically, a controlled range and a boundary range are defined in the attribute of data parameters of the data model of the Internet of things, when the trigger event information value of the Internet of things equipment is in the boundary range, a trigger event takes the generated time as a timestamp to carry out data marking, and the trigger event information value of the Internet of things equipment is sent to an Internet of things informatization system; when the value of the trigger event information value of the Internet of things equipment is out of the boundary range, the Internet of things data model directly takes the data as dirty data, adds a shielding label to the data, and feeds back shielding label information to the Internet of things informatization system.
S2, identity authentication is carried out on the Internet of things equipment;
identity authentication is carried out on the Internet of things equipment, the credibility of the Internet of things equipment accessed to the Internet of things terminal is guaranteed, and the Internet of things equipment which does not pass the identity authentication cannot be accessed to the Internet of things terminal. For all the internet of things equipment needing to be accessed to the internet of things information system for information interaction, the internet of things information system needs to register the equipment, and the internet of things information system allocates equipment ID for each piece of internet of things equipment needing to be accessed to the internet of things information system and activates the equipment, so that the equipment can carry out conversation with the internet of things information system.
Step S2, using the device ID as an identity tag of the internet of things device, where each internet of things device has an independent device ID; the equipment of the Internet of things applies for activation to the information system of the Internet of things, and sends equipment information including manufacturers, production batches, production passwords, chip unique codes and the like to the information system of the Internet of things. And the Internet of things informatization system judges and generates a unique equipment ID according to the equipment information through activation. The Internet of things informatization system informs the Internet of things equipment of successful activation, and issues equipment codes, equipment keys, digital certificates and the like to the Internet of things equipment, and the Internet of things equipment permanently stores the standby ID of the Internet of things equipment. If the internet of things equipment is activated for multiple times, the equipment key and the digital certificate of the internet of things equipment must be changed after each activation, and the equipment ID is kept unchanged. After the internet of things equipment is activated, when the internet of things equipment is connected with an internet of things information system every time, the equipment ID is submitted, an equipment key is used for encrypting a random number, and information to be sent to the internet of things information system is mixed with the encrypted random number and then sent to prevent the information from being intercepted and stolen.
For the device to interact with the platform, an information mechanism needs to be adopted for the device identity each time the device is reconnected. Identity authentication is carried out on the Internet of things equipment by adopting a behavior-based trust mechanism, the credibility of the Internet of things equipment is dynamically judged according to the behavior history record of the Internet of things equipment and the current behavior characteristics of the Internet of things equipment, the equipment ID, the Internet of things data model, digital signature information, an intelligent card or an encryption chip of the equipment or other identity authentication attribute information (secret information is stored in the intelligent card and can be an encrypted file of a user password or a random number) is used as a trust certificate and is compared with related information in a database containing identity authentication rule information of an Internet of things informatization system, and trust evaluation is output through a trust management engine of the Internet of things informatization system.
The method for calculating the trust evaluation of the trust management engine on certain Internet of things equipment comprises the following steps:
HX=α*TB-β*TM+γ*TQ+k*Tt,
wherein HXTrust evaluation value T representing certain Internet of things equipmentB、TM、TQ、TtRespectively representing the equipment ID, the data model of the Internet of things, the digital signature and the trust degree of the attribute information of the identification of the equipment per se, TB、TM、TQ、TtAll values of (A) are not more than 1, and alpha, beta, gamma and k are respectively TB、TM、TQ、TtIs 1, while the internet of things device itself isWhen the smart card or the cryptographic chip or other identification attribute information is absent, k is 0.
TB、TM、TQ、TtThe calculation of (2) adopts a judgment value method or a maximum possible value method. For the evaluation method, TBHas a judgment value of 0 or 1, TMThe judgment value of (A) is related to the number of times of deleting abnormal dirty data in unit time of the data model of the Internet of things, TQ、TtThe evaluation value of (a) is defined according to the evaluation requirement.
For the maximum possible value method, which utilizes the maximum likelihood estimation method MLE, when the confidence probability distribution function is known and the parameters of the probability distribution are unknown, the MLE infers the unknown probability distribution parameters from the obtained confidence results, and the inferred probability distribution parameters maximize the probability of the obtained confidence results. The reliability of the ith Internet of things equipment is tiThe probability that the ith Internet of things equipment passes the identity authentication is equal to the credibility of the ith Internet of things equipment, and the verification result of the ith Internet of things equipment on the kth Internet of things equipment is xi,kAnd recording adjacent equipment of the ith Internet of things equipment as n (i), and solving by using an MLE (maximum likelihood analysis) method to obtain a trust probability distribution function p (x)i,k,ti,lk) The parameter at which the maximum value is taken, i.e.
Figure BDA0003234551720000051
Solving for t at which the above equation is maximizediI.e. the calculation result of the credibility of the equipment ID, the Internet of things data model, the digital signature or the identity certificate attribute information of the equipment of the ith Internet of things equipment, wherein N is the number of the physical network equipment, and l is the number of the physical network equipmentkTaking the initial trust degree estimated value of the kth Internet of things equipment as one of the initial trust degree estimated values of equipment ID, an Internet of things data model, a digital signature or equipment identity certificate attribute information according to the lkInitial estimate of the specific confidence taken, tiI.e. the result of the calculation of the corresponding confidence level. For example, |kFor the kth station internet of thingsInitial estimate of confidence level of device ID of device, tiThe confidence level of the device ID of the ith Internet of things device is calculated.
S3, encrypting and transmitting the data;
the method specifically comprises the steps that in the data transmission process, a receiver sends a public key of the receiver to a sender, encrypts a key of a symmetric encryption algorithm by using the public key of the sender, sends the encrypted key of the symmetric encryption algorithm to the receiver, decrypts the received key by using an own private key to obtain the key of the symmetric encryption method, then the sender sends original information encrypted by using the own private key to the receiver, and the receiver decrypts the received information by using the key of the symmetric encryption algorithm.
In the information transmission process between the Internet of things equipment or the Internet of things informatization system, the transmitted information is digitally signed to prove the identity of the information, the transmitted information is signed and authenticated by utilizing an improved asymmetric encryption algorithm, the identity of a private key owner is verified by a public key, the information is confirmed to be signed and sent by an information sender through the digital signature, the summary information of the transmitted information is encrypted by using a private key of the sender in the signature authentication process, then the encrypted ciphertext and the unencrypted original text are transmitted to an information receiver, the encrypted summary information is decrypted by the public key of the sender by the receiver, then the decrypted summary information is decrypted by using a summary information encryption method the same as that of the sender, and the obtained summary information is compared with the original summary information of the transmitted information, if the information is the same, the received information is complete and is not tampered by a third party in the transmission process. The method comprises the steps that the Internet of things equipment performs registration authentication on an Internet of things concept informatization system and performs authorization authentication through the Internet of things informatization system, a certificate management system in the Internet of things informatization system generates 2 pairs of keys, one pair of keys is used for a private key and a public key of an asymmetric encryption method, the other pair of keys is used for a symmetric encryption method, and meanwhile, a digital certificate is generated and fed back to the Internet of things equipment.
S4, defining the application layer protocol;
the data interaction between the Internet of things equipment and the Internet of things information system is carried out through an application layer protocol, the adopted application layer protocol comprises MQTT, COAP, HTTP, MIT-LINK protocol and the like, and parameters of the application layer protocol MIT-LINK are redefined according to data interaction requirements. The MIT-Link protocol is a message transmission protocol of a request/distribution mode of a client/server architecture, the MIT-Link protocol adopts a request/response model, the Internet of things equipment sends a request message to the Internet of things information system, the request message comprises a request type, a protocol name and a version, an Internet of things equipment identifier and request data, the Internet of things information system sends a response message to the Internet of things equipment after receiving the request message, and the response message comprises a response type, a protocol name and a version, a reason code and response data; specifically, the Internet of things equipment is connected to the Internet of things informatization system and sends a connection request message. The Internet of things informatization system receives the connection request, sends a response message and establishes a TCP socket connection; the Internet of things equipment sends an operation request message, the Internet of things information system receives the operation request message and returns a response message, the Internet of things equipment sends a connection closing request message, and the Internet of things information system receives the connection closing request message and releases TCP connection.
The message of the MIT-Link protocol comprises a message header and a message body, wherein the message header comprises: the message type, protocol name, protocol version, connection mark, connection maintaining time and message body length, wherein the message body comprises: device ID, message data.
S5, adopting a data access stability maintaining mechanism;
when a plurality of internet of things devices simultaneously initiate a network access operation process, message collision is generated at a gateway by an initiated network access application, so that the plurality of internet of things devices cannot normally join a network, the internet of things devices adopt a monitoring mechanism and a rule engine mechanism, the internet of things devices firstly randomly retreat for a period of time and monitor the busy and idle state of the network in the network access operation process, if the current network channel is in the idle state, the internet of things devices initiate the network access operation, and if the current network channel is in the busy state, the internet of things devices wait for the next network access time slot to carry out the network access operation. According to the operation, the network access process of all the Internet of things equipment is realized.
The invention has the beneficial effects that:
the invention provides an integrated and comprehensive solution by matching with communication network module interface capabilities of devices such as a gateway and an intelligent terminal and applying a software development component to the devices such as the gateway and the like by relying on the advantages of an embedded technology, and realizes that the devices of the Internet of things can select a proper mode according to the network environment condition and transmit the data of the Internet of things to the most terminal information system of the Internet of things. The invention has good application prospect.
Drawings
FIG. 1 is a flow chart of an implementation of the method of the present invention;
FIG. 2 is a diagram of a data flow to architecture design of the method of the present invention;
FIG. 3 is a flowchart of the device identity trust authentication method of the present invention;
FIG. 4 is a flow chart of the attribute reporting of the data model of the Internet of things according to the method of the invention;
fig. 5 is a definition diagram of the attribute rule of the data model of the internet of things according to the method of the invention.
Detailed Description
For a better understanding of the present disclosure, an example is given here.
The invention defines a Software Development Kit (SDK) loaded on the Internet of things equipment to realize data acquisition, data encapsulation, data reporting and the like; according to the invention, the Internet of things data model is used for carrying out digital description on the Internet of things equipment entity, so that the Internet of things equipment can be identified by an Internet of things informatization system and can be subjected to processing such as function call; the method confirms the credibility of the equipment accessing to the Internet of things of the information system by a self-defined equipment identity card mechanism; the invention realizes the safe and high-efficiency data transmission and the like by using an improved encryption technology and matching with a self-defined protocol. The architecture relationship of the implementation of the invention is shown in figure 1. The data flow architecture design is as shown in fig. 2. Fig. 3 is a flowchart of the authentication process of the device identity trust of the method of the present invention. Fig. 4 is a process diagram of reporting attributes of the data model of the internet of things according to the method of the present invention. Fig. 5 is a definition diagram of the attribute rule of the data model of the internet of things according to the method of the invention.
The invention discloses a data interaction method based on Internet of things equipment acquisition, which is realized by utilizing a gateway, the Internet of things equipment and an Internet of things informatization system, wherein the Internet of things informatization system is connected with the gateway, the Internet of things equipment is connected with the gateway, and the gateway, the Internet of things equipment and the Internet of things informatization system jointly form an Internet of things network. The Internet of things informatization system is used for receiving perception data acquired by various Internet of things devices, providing a unified informatization platform for collection, aggregation, processing, fusion and mining analysis of the perception data, and providing shared distribution service of the perception data. The Internet of things equipment comprises various sensors, and the gateway comprises a WAPI module, an Ethernet module, a ZigBee module, a serial port module, a LORA module, an LTE module, a 4G/5G module, a Beidou module and the like, and an NBIOT module and the like. The gateway is used for realizing data analysis on the heterogeneous network modules, enabling the data forwarding coordinators between the heterogeneous networks to exchange information with each other through the serial port modules of the gateway, reading and analyzing data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, providing the read data through the serial port modules of the gateway, analyzing the data uploaded by the data forwarding coordinators between the heterogeneous networks by the gateway, storing the data into a database of the gateway, and repackaging and converting the data into a standardized format.
The gateway also comprises an Internet of things embedded software development component, the Internet of things embedded software development component is loaded in the gateway and used for realizing the rapid input of data into the Internet of things terminal, and the Internet of things embedded software development component provides an edge computing function, so that the gateway is supported to have random access and plug and play to a heterogeneous network environment. The Internet of things embedded software development component comprises a data model SDK, an encryption and decryption SDK, an edge computing SDK and the like, provides a standardized data transmission mode, and has the functions of data caching, data deduplication, data retransmission, data aggregation, data reporting, equipment control, standardized data format conversion and the like. The SDK has the greatest characteristic of being capable of cutting and packaging according to the storage space of the internet of things equipment, being capable of adjusting the process sequence according to the size of the storage space and the transmission requirement, and being suitable for the equipment scene with the small packaging requirement of the code.
The method comprises the following specific steps:
s1, defining an Internet of things data model;
the Internet of things data model is characterized in that after physical equipment is abstracted and modeled, sensing data of various Internet of things equipment is subjected to standard digital description, corresponding JSON format file data models are established for the various Internet of things equipment, and the Internet of things data models are stored in a JSON format in an Internet of things informatization system; based on the data model of the Internet of things, the application development of the Internet of things can be directly carried out. The data model of the internet of things defines a set of corresponding standard data parameters for each type of internet of things equipment, and the standard data parameters comprise all parameters used by the type of internet of things equipment. Specifically, the internet of things informatization system abstracts the functions of various internet of things equipment into data parameters consisting of attributes, functions, events and extensions by using the internet of things data model, and the data parameters are used for data interaction between the various internet of things equipment and the internet of things informatization system; and the attribute of the data parameter is used for describing the running state of the equipment of the Internet of things. The information system of the internet of things actively sends messages to obtain the attributes of the devices of the internet of things, and the devices of the internet of things report the attributes to the information system of the internet of things through events.
The data parameter function records the capability or method of the internet of things equipment which can be called externally, and the settable input parameter and output parameter of the internet of things equipment, and is the basis of the internet of things informatization system for executing a certain linkage and other task control function instructions on the internet of things equipment.
The event of the data parameter records an event occurring when the internet of things equipment runs, and the event comprises notification information which needs to be sensed and processed externally and comprises a plurality of output parameters.
The expansion of the data parameters records the self-defined expansion fields such as the device labels and the like, and is used for realizing information sharing.
The same data model is adopted by the same type of Internet of things equipment by the Internet of things data model, the same type of Internet of things equipment is defined by the Internet of things data model, and data of the same type of Internet of things equipment is standardized, so that the same type of Internet of things equipment can be automatically identified by an Internet of things information system and analyzed and configured after being accessed into the Internet of things, and the workload of artificial configuration is reduced. The Internet of things informatization system forms a standardized service pool or resource pool by using the Internet of things data model, and the Internet of things informatization system acquires data resources or service resources of different types of Internet of things equipment by using the service pool or resource pool.
The design element fields contained in the data model of the Internet of things can be customized by a user, data types and unit customization are supported, and the data model of the Internet of things has the characteristics of convenience and flexibility. The data model of the Internet of things has abnormal data processing capacity and can shield data which can cause misoperation of the Internet of things equipment, specifically, a controlled range and a boundary range are defined in the attribute of data parameters of the data model of the Internet of things, when the trigger event information value of the Internet of things equipment is in the boundary range, a trigger event takes the generated time as a timestamp to carry out data marking, and the trigger event information value of the Internet of things equipment is sent to an Internet of things informatization system; when the value of the trigger event information value of the Internet of things equipment is out of the boundary range, the Internet of things data model directly takes the data as dirty data, adds a shielding label to the data, and feeds back shielding label information to the Internet of things informatization system.
S2, identity authentication is carried out on the Internet of things equipment;
the application service of the Internet of things has the characteristics of more access devices and wide distribution region, so the possibility of falsely using and falsely modifying the equipment of the Internet of things exists. Identity authentication is carried out on the Internet of things equipment, the credibility of the Internet of things equipment accessed to the Internet of things terminal is guaranteed, and the Internet of things equipment which does not pass the identity authentication cannot be accessed to the Internet of things terminal. For all the internet of things equipment needing to be accessed to the internet of things information system for information interaction, the internet of things information system needs to register the equipment, and the internet of things information system allocates equipment ID for each piece of internet of things equipment needing to be accessed to the internet of things information system and activates the equipment, so that the equipment can carry out conversation with the internet of things information system.
Step S2, using the device ID as an identity tag of the internet of things device, where each internet of things device has an independent device ID; the equipment of the Internet of things applies for activation to the information system of the Internet of things, and sends equipment information including manufacturers, production batches, production passwords, chip unique codes and the like to the information system of the Internet of things. And the Internet of things informatization system judges and generates a unique equipment ID according to the equipment information through activation. The Internet of things informatization system informs the Internet of things equipment of successful activation, and issues equipment codes, equipment keys, digital certificates and the like to the Internet of things equipment, and the Internet of things equipment permanently stores the standby ID of the Internet of things equipment. If the internet of things equipment is activated for multiple times, the equipment key and the digital certificate of the internet of things equipment must be changed after each activation, and the equipment ID is kept unchanged. After the internet of things equipment is activated, when the internet of things equipment is connected with an internet of things information system every time, the equipment ID is submitted, an equipment key is used for encrypting a random number, and information to be sent to the internet of things information system is mixed with the encrypted random number and then sent to prevent the information from being intercepted and stolen.
For the device to interact with the platform, an information mechanism needs to be adopted for the device identity each time the device is reconnected. Identity authentication is performed on the internet of things equipment by adopting a behavior-based trust mechanism, the credibility of the internet of things equipment is dynamically judged according to the behavior history record of the internet of things equipment and the current behavior characteristics of the internet of things equipment, the equipment ID, the internet of things data model, digital signature information, an intelligent card or an encryption chip of the equipment or other identity authentication attribute information (secret information is stored in the intelligent card and can be an encrypted file of a user password or a random number) is used as a trust certificate and is compared with related information in a database containing identity authentication rule information of an internet of things informatization system, and trust evaluation is output through a trust management engine of the internet of things informatization system, as shown in figure 4.
The method for calculating the trust evaluation of the trust management engine on certain Internet of things equipment comprises the following steps:
HX=α*TB-β*TM+γ*TQ+k*Tt,
wherein HXTrust evaluation value T representing certain Internet of things equipmentB、TM、TQ、TtRespectively representing the equipment ID, the data model of the Internet of things, the digital signature and the trust degree of the attribute information of the identification of the equipment per se, TB、TM、TQ、TtAll values of (A) are not more than 1, and alpha, beta, gamma and k are respectively TB、TM、TQ、TtThe sum of the weighting parameters is 1, and when the smart card or the encryption chip of the internet of things device itself or other identification attribute information is absent, k is 0. The values of the alpha, beta, gamma and k parameters can provide two sets of parameter value results according to the existence of the smart card or an encryption chip of the device or other identification attribute information (secret information is stored in the smart card).
TB、TM、TQ、TtThe calculation of (2) adopts a judgment value method or a maximum possible value method. For the evaluation method, TBHas a judgment value of 0 or 1, TMThe judgment value of (A) is related to the number of times of deleting abnormal dirty data in unit time of the data model of the Internet of things, TQ、TtThe evaluation value of (a) is defined according to the evaluation requirement.
For the maximum possible value method, the maximum likelihood estimation method MLE is utilized, the maximum likelihood estimation Method (MLE) is a trust inference method based on probability, and is suitable for a probability model and a belief model, under the condition that a trust probability distribution function is known and the parameters of probability distribution are unknown, the MLE infers unknown probability distribution parameters according to the obtained trust result, and the inferred probability distribution parameters enable the probability of the obtained trust result to be maximum. The reliability of the ith Internet of things equipment is tiThe probability that the ith Internet of things equipment passes the identity authentication is equal to the credibility of the ith Internet of things equipment, and the verification result of the ith Internet of things equipment on the kth Internet of things equipment is xi,kAnd recording adjacent equipment of the ith Internet of things equipment as n (i), and solving by using an MLE (maximum likelihood analysis) method to obtain a trust probability distribution function p (x)i,k,ti,lk) The parameter at which the maximum value is taken, i.e.
Figure BDA0003234551720000121
Solving for t at which the above equation is maximizediI.e. the calculation result of the credibility of the equipment ID, the Internet of things data model, the digital signature or the identity certificate attribute information of the equipment of the ith Internet of things equipment, wherein N is the number of the physical network equipment, and l is the number of the physical network equipmentkTaking the initial trust degree estimated value of the kth Internet of things equipment as one of the initial trust degree estimated values of equipment ID, an Internet of things data model, a digital signature or equipment identity certificate attribute information according to the lkInitial estimate of the specific confidence taken, tiI.e. the result of the calculation of the corresponding confidence level. For example, |kWhen the confidence level is an initial estimated value of the equipment ID of the kth Internet of things equipmentiThe confidence level of the device ID of the ith Internet of things device is calculated.
S3, encrypting and transmitting the data;
and carrying out encryption transmission on the data by using an encryption algorithm of a digital certificate mechanism, and sending the data to a destination by adopting an encryption transmission technology. The invention improves the prior art, ensures the safe transmission of data (information is not tampered, not monitored and the like) and simultaneously improves the speed efficiency of encryption and decryption.
The data sent by the Internet of things equipment is guaranteed not to be intercepted by adopting a key encryption mode, and the key encryption mode comprises a symmetric encryption algorithm and an asymmetric encryption algorithm. The symmetric encryption algorithm has high possibility of password leakage, and the efficiency of the asymmetric encryption algorithm is very low. The method specifically comprises the steps that in the data transmission process, a receiver sends a public key of the receiver to a sender, encrypts a secret key of a symmetric encryption algorithm by using the public key of the sender, sends the encrypted secret key of the symmetric encryption algorithm to a receiver, decrypts the received secret key by using an own private key to obtain the secret key of a symmetric encryption method, sends original information encrypted by using the own private key to the receiver, and decrypts the received information by using the secret key of the symmetric encryption algorithm.
The method comprises the steps that the information transmitted by the information transmission device is subjected to digital signature to prove the identity of the information, signature authentication is carried out on the transmitted information by utilizing an improved asymmetric encryption algorithm, the identity of a private key owner is verified through a public key, the information is confirmed to be signed and sent by an information sender through digital signature, and other people cannot forge the signature of the information sender at all because other people do not have the private key of the information sender. The signature authentication process comprehensively uses an asymmetric encryption method and a digital digest method, the signature authentication process encrypts digest information of transmitted information by using a private key of a sender, then transmits the encrypted ciphertext and unencrypted original text to a receiver of the information, the receiver decrypts the encrypted digest information by using a public key of the sender, then decrypts the decrypted digest information by using a digest information encryption method the same as that of the sender, compares the obtained digest information with the original digest information of the transmitted information, and if the obtained digest information is the same as that of the sender, the received information is complete and is not tampered by a third party in the transmission process. Specifically, a hash value is obtained by performing a hash calculation on the information, and when the information is sent out, the hash value is encrypted and then is sent out together with the information as a signature. After receiving the message, the receiver recalculates the hash value of the message, compares the hash value with the hash value attached to the message (after decryption), and if the hash value is consistent with the hash value attached to the message, the receiver indicates that the content of the message is not modified. The digital signature is intercepted and imitated, so that people who are not good will modify the hash value while modifying the information content, so that the information content and the hash value can be matched. Therefore, the scheme of the invention is as follows: the method comprises the steps that the Internet of things equipment performs registration authentication on an Internet of things concept informatization system and performs authorization authentication through the Internet of things informatization system, a certificate management system in the Internet of things informatization system generates 2 pairs of keys, one pair of keys is used for a private key and a public key of an asymmetric encryption method, the other pair of keys is used for a symmetric encryption method, and meanwhile, a digital certificate (comprising an equipment signature and the public key) is generated and fed back to the Internet of things equipment. The digital certificate defined by the present invention contains certificate information fields as described in table 1.
TABLE 1 certificate information field
Figure BDA0003234551720000141
S4, defining the application layer protocol;
the Internet of things equipment and the Internet of things information system carry out data interaction through an application layer protocol, the adopted application layer protocol comprises MQTT, COAP, HTTP, MIT-LINK protocol and the like, parameters of the application layer protocol MIT-LINK are redefined according to data interaction requirements, and the application layer protocol can be well matched with an encryption technology to provide a safe and credible channel. The MIT-LINK protocol is a message transmission protocol of a request/distribution mode of a client/server architecture, and has the characteristics of lightness, standardization and the like aiming at an application protocol set by the Internet of things. And the MIT-LINK supports functions of long connection, real-time communication, offline feedback mechanism and the like. MIT-LINK is applicable to low-power consumption, low-storage, narrow-bandwidth application scenarios. The MIT-Link protocol defines how the client and server communicate. The MIT-Link protocol adopts a request/response model, the Internet of things equipment sends a request message to the Internet of things information system, the request message comprises the type, the protocol name and the version of the request, the identifier of the Internet of things equipment and request data, the Internet of things information system sends a response message to the Internet of things equipment after receiving the request message, and the response message comprises the type, the protocol name and the version, a reason code and response data of the response; specifically, the Internet of things equipment is connected to the Internet of things informatization system and sends a connection request message. The Internet of things informatization system receives the connection request, sends a response message and establishes a TCP socket connection; the Internet of things equipment sends an operation request message, the Internet of things information system receives the operation request message and returns a response message, the Internet of things equipment sends a connection closing request message, and the Internet of things information system receives the connection closing request message and releases TCP connection.
The message of the MIT-Link protocol comprises a message header and a message body, wherein the message header comprises: the message type, protocol name, protocol version, connection mark, connection maintaining time and message body length, wherein the message body comprises: device ID, message data.
S5, adopting a data access stability maintaining mechanism;
aiming at performance requirements (including real-time data processing capacity and transmission rate) of simultaneous access of heterogeneous networks of the Internet of things equipment, the Internet of things informatization system adopts a load balancing strategy, a resource allocation mechanism and the like, and improves the data link communication capacity of the Internet of things equipment so as to meet application requirements. For the case of simultaneous access of heterogeneous networks, when the internet of things device moves to an overlapping area covered by multiple networks simultaneously, the multiple networks are accessed simultaneously according to the data chain communication system equipped by the internet of things device.
When a plurality of internet of things devices simultaneously initiate a network access operation process, message collision is generated at a gateway by the initiated network access application, so that the plurality of internet of things devices cannot normally join a network, the internet of things devices adopt a monitoring mechanism and a rule engine mechanism, no matter an active network access mode or a passive network access mode is adopted, the internet of things devices firstly randomly retreat for a period of time and monitor the busy and idle state of the network in the network access operation process, if the current network channel is in the idle state, the internet of things devices initiate the network access operation, and if the current network channel is in the busy state, the next network access time slot is waited for network access operation. According to the operation, the network access process of all the Internet of things equipment is realized.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (6)

1. A data interaction method based on Internet of things equipment acquisition is characterized in that the data interaction method is realized by utilizing a gateway, the Internet of things equipment and an Internet of things informatization system, wherein the Internet of things informatization system is connected with the gateway; the system comprises an Internet of things informatization system, a data processing system and a data processing system, wherein the Internet of things informatization system is used for receiving sensing data acquired by various Internet of things devices, providing a uniform informatization platform for acquisition, aggregation, processing, fusion and mining analysis of the sensing data, and providing shared distribution service of the sensing data; the Internet of things equipment comprises various sensors, a gateway is used for realizing data analysis on heterogeneous network modules, so that data forwarding coordinators between heterogeneous networks exchange information with each other through a serial port module of the gateway, the gateway reads and analyzes data uploaded by the data forwarding coordinators between the heterogeneous networks and provides the read data through the serial port module of the gateway, and after the data uploaded by the data forwarding coordinators between the heterogeneous networks is analyzed by the gateway, the data are stored in a database of the gateway and are encapsulated again and converted into a standardized format;
the gateway also comprises an Internet of things embedded software development component, the Internet of things embedded software development component is loaded in the gateway and used for realizing the rapid input of data into the Internet of things terminal, and the Internet of things embedded software development component provides an edge computing function so as to support the gateway to realize random access and plug and play of a heterogeneous network environment; the Internet of things embedded software development component comprises a data model SDK, an encryption and decryption SDK and an edge calculation SDK, provides a standardized data transmission mode, and has the functions of data caching, data deduplication, data retransmission, data aggregation, data reporting, equipment control and standardized data format conversion; the method comprises the following specific steps:
s1, defining an Internet of things data model;
the Internet of things data model is characterized in that after physical equipment is abstracted and modeled, sensing data of various Internet of things equipment is subjected to standard digital description, corresponding JSON format file data models are established for the various Internet of things equipment, and the Internet of things data models are stored in a JSON format in an Internet of things informatization system; the data model of the Internet of things defines a set of corresponding standard data parameters for each type of Internet of things equipment, and the standard data parameters comprise all parameters used by the type of Internet of things equipment; specifically, the internet of things informatization system abstracts the functions of various internet of things equipment into data parameters consisting of attributes, functions, events and extensions by using the internet of things data model, and the data parameters are used for data interaction between the various internet of things equipment and the internet of things informatization system;
the data model of the internet of things adopts the same data model for the same type of internet of things equipment, and the data model of the internet of things equipment is defined for the same type of internet of things equipment, so that the data of the same type of internet of things equipment is standardized, and the same type of internet of things equipment can be automatically identified, analyzed and configured by an internet of things informatization system after being accessed into the internet of things; the Internet of things informatization system forms a standardized service pool or resource pool by using the Internet of things data model, and the Internet of things informatization system acquires data resources or service resources of different types of Internet of things equipment by using the service pool or resource pool;
the data model of the Internet of things has abnormal data processing capacity and can shield data which can cause misoperation of the Internet of things equipment, specifically, a controlled range and a boundary range are defined in the attribute of data parameters of the data model of the Internet of things, when the trigger event information value of the Internet of things equipment is in the boundary range, a trigger event takes the generated time as a timestamp to carry out data marking, and the trigger event information value of the Internet of things equipment is sent to an Internet of things informatization system; when the value of the trigger event information value of the Internet of things equipment is out of the boundary range, the Internet of things data model directly takes the data as dirty data, adds a shielding label to the data and feeds back shielding label information to an Internet of things informatization system;
s2, identity authentication is carried out on the Internet of things equipment;
identity authentication is carried out on the Internet of things equipment, so that the credibility of the Internet of things equipment accessed to the Internet of things terminal is ensured, and the Internet of things equipment which does not pass the identity authentication cannot be accessed to the Internet of things terminal; for all the Internet of things equipment needing to be accessed to the Internet of things informatization system for information interaction, the Internet of things informatization system needs to register the equipment, and the Internet of things informatization system allocates equipment ID for each piece of Internet of things equipment needing to be accessed to the Internet of things informatization system and activates the equipment, so that the equipment can carry out conversation with the Internet of things informatization system;
s3, encrypting and transmitting the data;
the method specifically comprises the steps that in the data transmission process, a receiver sends a public key of the receiver to a sender, encrypts a key of a symmetric encryption algorithm by using the public key of the sender, sends the encrypted key of the symmetric encryption algorithm to the receiver, decrypts the received key by using an own private key to obtain the key of the symmetric encryption method, sends original information encrypted by using the own private key to the receiver, and decrypts the received information by using the key of the symmetric encryption algorithm;
in the information transmission process between the Internet of things equipment or the Internet of things informatization system, the transmitted information is digitally signed to prove the identity of the information, the transmitted information is signed and authenticated by utilizing an improved asymmetric encryption algorithm, the identity of a private key owner is verified by a public key, the information is confirmed to be signed and sent by an information sender through the digital signature, the summary information of the transmitted information is encrypted by using a private key of the sender in the signature authentication process, then the encrypted ciphertext and the unencrypted original text are transmitted to an information receiver, the encrypted summary information is decrypted by the public key of the sender by the receiver, then the decrypted summary information is decrypted by using a summary information encryption method the same as that of the sender, and the obtained summary information is compared with the original summary information of the transmitted information, if the received information is the same as the received information, the received information is complete and is not tampered by a third party in the transmission process; the method comprises the following steps that the Internet of things equipment performs registration authentication in an Internet of things concept informatization system and performs authorization authentication through the Internet of things informatization system, a certificate management system in the Internet of things informatization system generates 2 pairs of keys, one pair of keys is used for a private key and a public key of an asymmetric encryption method, the other pair of keys is used for a symmetric encryption method, and meanwhile, a digital certificate is generated and fed back to the Internet of things equipment;
s4, defining the application layer protocol;
the method comprises the following steps that data interaction is carried out between the Internet of things equipment and an Internet of things information system through an application layer protocol, the adopted application layer protocol comprises MQTT, COAP, HTTP and MIT-LINK protocols, and parameters of the application layer protocol MIT-LINK are redefined according to data interaction requirements; the MIT-Link protocol is a message transmission protocol of a request/distribution mode of a client/server architecture, the MIT-Link protocol adopts a request/response model, the Internet of things equipment sends a request message to the Internet of things information system, the request message comprises a request type, a protocol name and a version, an Internet of things equipment identifier and request data, the Internet of things information system sends a response message to the Internet of things equipment after receiving the request message, and the response message comprises a response type, a protocol name and a version, a reason code and response data;
s5, adopting a data access stability maintaining mechanism;
when a plurality of Internet of things devices simultaneously initiate a network access operation process, message collision is generated at a gateway by an initiated network access application, so that the plurality of Internet of things devices cannot normally join a network, the Internet of things devices adopt a monitoring mechanism and a rule engine mechanism, the Internet of things devices firstly randomly back off for a period of time and monitor the busy and idle state of the network in the network access operation process, if a current network channel is in an idle state, the Internet of things devices initiate network access operation, and if the current network channel is in a busy state, the Internet of things devices wait for the next network access time slot to carry out network access operation; according to the operation, the network access process of all the Internet of things equipment is realized.
2. The data interaction method based on the Internet of things equipment acquisition as claimed in claim 1,
the attribute in the data parameter is used for describing the running state of the equipment of the Internet of things; the information system of the Internet of things actively sends messages to obtain the attributes of each piece of equipment of the Internet of things, and each piece of equipment of the Internet of things reports the attributes to the information system of the Internet of things through events;
the functions in the data parameters record the capability or method of the internet of things equipment which can be called externally, and the settable input parameters and output parameters of the internet of things equipment, and are the basis of the internet of things informatization system for executing a certain linkage task control function instruction on the internet of things equipment;
the event in the data parameters records an event occurring when the internet of things equipment runs, wherein the event comprises notification information needing to be sensed and processed externally and comprises a plurality of output parameters;
the expansion in the data parameters records the self-defined expansion field of the device tag and is used for realizing information sharing.
3. The data interaction method based on the Internet of things equipment acquisition as claimed in claim 1,
step S2, using the device ID as an identity tag of the internet of things device, where each internet of things device has an independent device ID; the equipment of the Internet of things applies for activation to the information system of the Internet of things, and sends equipment information including a manufacturer, a production batch, a production password and a chip unique code to the information system of the Internet of things; the Internet of things informatization system judges and generates a unique equipment ID according to the equipment information through activation; the Internet of things informatization system informs the Internet of things equipment of successful activation, and issues an equipment code, an equipment key and a digital certificate to the Internet of things equipment, and the Internet of things equipment permanently stores the standby ID of the equipment; if the Internet of things equipment is activated for multiple times, the equipment key and the digital certificate of the Internet of things equipment must be changed after each activation, and the equipment ID remains unchanged; after the Internet of things equipment is activated, when the Internet of things equipment is connected with an Internet of things informatization system each time, the equipment ID is submitted, an equipment key is used for encrypting a section of random number, and information to be sent to the Internet of things informatization system is mixed with the encrypted random number and then sent to prevent the information from being intercepted and stolen;
for the equipment which has interacted with the platform, an information mechanism is required to be adopted for the equipment identity during each reconnection; identity authentication is carried out on the Internet of things equipment by adopting a trust mechanism based on behaviors, the credibility of the Internet of things equipment is dynamically judged through the behavior history record of the Internet of things equipment and the current behavior characteristics of the Internet of things equipment, the equipment ID, the Internet of things data model, digital signature information, an intelligent card or an encryption chip of the equipment or other identity certificate attribute information are used as trust certificates and are compared with relevant information in a database containing identity authentication rule information of an Internet of things informatization system, and trust evaluation is output through a trust management engine of the Internet of things informatization system;
the method for calculating the trust evaluation of the trust management engine on certain Internet of things equipment comprises the following steps:
HX=α*TB-β*TM+γ*TQ+k*Tt,
wherein HXTrust evaluation value T representing certain Internet of things equipmentB、TM、TQ、TtRespectively representing the equipment ID, the data model of the Internet of things, the digital signature and the trust degree of the attribute information of the identification of the equipment per se, TB、TM、TQ、TtAll values of (A) are not more than 1, and alpha, beta, gamma and k are respectively TB、TM、TQ、TtThe sum of the weighted parameters is 1, and when the smart card or the encryption chip of the internet of things device or other identification attribute information is not available, k is 0;
TB、TM、TQ、Ttthe calculation of (2) adopts a judgment value method or a maximum possible value method.
4. The data interaction method based on the Internet of things equipment acquisition as claimed in claim 3,
for the evaluation method, TBIs 0 or 1, and the evaluation value of (c),TMthe judgment value of (A) is related to the number of times of deleting abnormal dirty data in unit time of the data model of the Internet of things, TQ、TtThe evaluation value of (a) is defined according to the evaluation requirement.
5. The data interaction method based on the Internet of things equipment acquisition as claimed in claim 3,
for the maximum possible value method, a maximum likelihood estimation method MLE is utilized, under the condition that a trust probability distribution function is known and the parameters of probability distribution are unknown, the MLE conjectures the unknown probability distribution parameters according to the obtained trust results, and the probability distribution parameters are deduced to enable the probability of the obtained trust results to be maximum; the reliability of the ith Internet of things equipment is tiThe probability that the ith Internet of things equipment passes the identity authentication is equal to the credibility of the ith Internet of things equipment, and the verification result of the ith Internet of things equipment on the kth Internet of things equipment is xi,kAnd recording adjacent equipment of the ith Internet of things equipment as n (i), and solving by using an MLE (maximum likelihood analysis) method to obtain a trust probability distribution function p (x)i,k,ti,lk) The parameter at which the maximum value is taken, i.e.
Figure FDA0003234551710000061
Solving for t at which the above equation is maximizediI.e. the calculation result of the credibility of the equipment ID, the Internet of things data model, the digital signature or the identity certificate attribute information of the equipment of the ith Internet of things equipment, wherein N is the number of the physical network equipment, and l is the number of the physical network equipmentkTaking the initial trust degree estimated value of the kth Internet of things equipment as one of the initial trust degree estimated values of equipment ID, an Internet of things data model, a digital signature or equipment identity certificate attribute information according to the lkInitial estimate of the specific confidence taken, tiI.e. the result of the calculation of the corresponding confidence level.
6. The data interaction method based on the Internet of things equipment acquisition as claimed in claim 1,
the step S4 specifically includes that the internet of things device is connected to the internet of things informatization system, and sends a connection request message; the Internet of things informatization system receives the connection request, sends a response message and establishes a TCP socket connection; the Internet of things equipment sends an operation request message, the Internet of things information system receives the operation request message and returns a response message, the Internet of things equipment sends a connection closing request message, and the Internet of things information system receives the connection closing request message and releases TCP connection.
CN202110997397.6A 2021-08-27 2021-08-27 Data interaction method based on Internet of things equipment acquisition Active CN113765713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110997397.6A CN113765713B (en) 2021-08-27 2021-08-27 Data interaction method based on Internet of things equipment acquisition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110997397.6A CN113765713B (en) 2021-08-27 2021-08-27 Data interaction method based on Internet of things equipment acquisition

Publications (2)

Publication Number Publication Date
CN113765713A true CN113765713A (en) 2021-12-07
CN113765713B CN113765713B (en) 2024-02-27

Family

ID=78791666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110997397.6A Active CN113765713B (en) 2021-08-27 2021-08-27 Data interaction method based on Internet of things equipment acquisition

Country Status (1)

Country Link
CN (1) CN113765713B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746850A (en) * 2021-09-07 2021-12-03 成都小步创想慧联科技有限公司 Multi-channel data acquisition method for Internet of things
CN114048017A (en) * 2022-01-13 2022-02-15 之江实验室 Internet of things equipment cooperative linkage method and device
CN114363377A (en) * 2022-01-11 2022-04-15 徐工汉云技术股份有限公司 Mechanical vehicle communication method and system
CN114430369A (en) * 2022-01-27 2022-05-03 重庆电子工程职业学院 Industrial internet heterogeneous network fusion management system
CN114724679A (en) * 2022-03-09 2022-07-08 上海电气智能康复医疗科技有限公司 Distributed micro-service system based on rehabilitation medical equipment
CN115150204A (en) * 2022-09-05 2022-10-04 广州中浩控制技术有限公司 Data transmission system
CN115145989A (en) * 2022-07-04 2022-10-04 夏文祥 Data sharing method and device based on data model of Internet of things
TWI802447B (en) * 2022-06-21 2023-05-11 桓達科技股份有限公司 Packet encrypting and decrypting method for sensor with wireless communication
CN117354062A (en) * 2023-12-04 2024-01-05 天津市品茗科技有限公司 Management system of application platform of Internet of things
CN117436053A (en) * 2023-12-20 2024-01-23 永鼎行远(南京)信息科技有限公司 Data service bus system and data authentication transmission method
CN117692530A (en) * 2024-02-02 2024-03-12 中铁四局集团有限公司 Multi-protocol access system and method for multi-Internet of things equipment
CN118250090A (en) * 2024-05-24 2024-06-25 杭州宇泛智能科技股份有限公司 Internet of things platform information processing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103336510A (en) * 2013-06-27 2013-10-02 山东华戎信息产业有限公司 Comprehensive operation and maintenance management system for internet of things
CN106899638A (en) * 2015-12-21 2017-06-27 中国科学院信息工程研究所 A kind of fusions networking relationships system for solving Heterogeneous data and method
CN108347457A (en) * 2017-01-25 2018-07-31 电信科学技术研究院 A kind of communication means and communication equipment
US20190238433A1 (en) * 2018-01-31 2019-08-01 ImageKeeper LLC Synchronization of data collected by internet of things (iot) devices
CN112512024A (en) * 2021-02-05 2021-03-16 信联科技(南京)有限公司 5G network-oriented Internet of things terminal security convergence access method and system
CN112543140A (en) * 2020-12-03 2021-03-23 陕西拓普索尔电子科技有限责任公司 Intelligent gateway of internet of things supporting multi-protocol conversion from wired to wireless
GB202105097D0 (en) * 2021-04-09 2021-05-26 Vodafone Group Services Ltd Secure sensor data distribution

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103336510A (en) * 2013-06-27 2013-10-02 山东华戎信息产业有限公司 Comprehensive operation and maintenance management system for internet of things
CN106899638A (en) * 2015-12-21 2017-06-27 中国科学院信息工程研究所 A kind of fusions networking relationships system for solving Heterogeneous data and method
CN108347457A (en) * 2017-01-25 2018-07-31 电信科学技术研究院 A kind of communication means and communication equipment
US20190238433A1 (en) * 2018-01-31 2019-08-01 ImageKeeper LLC Synchronization of data collected by internet of things (iot) devices
CN112543140A (en) * 2020-12-03 2021-03-23 陕西拓普索尔电子科技有限责任公司 Intelligent gateway of internet of things supporting multi-protocol conversion from wired to wireless
CN112512024A (en) * 2021-02-05 2021-03-16 信联科技(南京)有限公司 5G network-oriented Internet of things terminal security convergence access method and system
GB202105097D0 (en) * 2021-04-09 2021-05-26 Vodafone Group Services Ltd Secure sensor data distribution

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张玉婷;严承华;魏玉人;: "基于节点认证的物联网感知层安全性问题研究", 信息网络安全, no. 11 *
陈文艺;张霏;龙艳;: "基于Socket.IO的物联网网关实时双向通信系统", 西安邮电大学学报, no. 06 *

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746850B (en) * 2021-09-07 2023-08-15 成都小步创想慧联科技有限公司 Multichannel data acquisition method for Internet of things
CN113746850A (en) * 2021-09-07 2021-12-03 成都小步创想慧联科技有限公司 Multi-channel data acquisition method for Internet of things
CN114363377A (en) * 2022-01-11 2022-04-15 徐工汉云技术股份有限公司 Mechanical vehicle communication method and system
CN114363377B (en) * 2022-01-11 2024-05-17 徐工汉云技术股份有限公司 Mechanical vehicle communication method and system
CN114048017A (en) * 2022-01-13 2022-02-15 之江实验室 Internet of things equipment cooperative linkage method and device
CN114048017B (en) * 2022-01-13 2022-04-22 之江实验室 Internet of things equipment cooperative linkage method and device
CN114430369A (en) * 2022-01-27 2022-05-03 重庆电子工程职业学院 Industrial internet heterogeneous network fusion management system
CN114430369B (en) * 2022-01-27 2024-01-09 重庆电子工程职业学院 Industrial Internet heterogeneous network fusion management system
CN114724679A (en) * 2022-03-09 2022-07-08 上海电气智能康复医疗科技有限公司 Distributed micro-service system based on rehabilitation medical equipment
TWI802447B (en) * 2022-06-21 2023-05-11 桓達科技股份有限公司 Packet encrypting and decrypting method for sensor with wireless communication
CN115145989A (en) * 2022-07-04 2022-10-04 夏文祥 Data sharing method and device based on data model of Internet of things
CN115150204B (en) * 2022-09-05 2023-01-10 广州中浩控制技术有限公司 Data transmission system
CN115150204A (en) * 2022-09-05 2022-10-04 广州中浩控制技术有限公司 Data transmission system
CN117354062A (en) * 2023-12-04 2024-01-05 天津市品茗科技有限公司 Management system of application platform of Internet of things
CN117354062B (en) * 2023-12-04 2024-02-09 天津市品茗科技有限公司 Management system of application platform of Internet of things
CN117436053A (en) * 2023-12-20 2024-01-23 永鼎行远(南京)信息科技有限公司 Data service bus system and data authentication transmission method
CN117436053B (en) * 2023-12-20 2024-02-23 永鼎行远(南京)信息科技有限公司 Data service bus system and data authentication transmission method
CN117692530A (en) * 2024-02-02 2024-03-12 中铁四局集团有限公司 Multi-protocol access system and method for multi-Internet of things equipment
CN117692530B (en) * 2024-02-02 2024-06-07 中铁四局集团有限公司 Multi-protocol access system and method for multi-Internet of things equipment
CN118250090A (en) * 2024-05-24 2024-06-25 杭州宇泛智能科技股份有限公司 Internet of things platform information processing method and device
CN118250090B (en) * 2024-05-24 2024-07-23 杭州宇泛智能科技股份有限公司 Internet of things platform information processing method and device

Also Published As

Publication number Publication date
CN113765713B (en) 2024-02-27

Similar Documents

Publication Publication Date Title
CN113765713B (en) Data interaction method based on Internet of things equipment acquisition
Gupta et al. An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
Jurcut et al. Introduction to IoT security
US20220060322A1 (en) Technologies for internet of things key management
Mahmoud et al. Internet of things (IoT) security: Current status, challenges and prospective measures
Yousuf et al. Internet of things (IoT) security: current status, challenges and countermeasures
Sanjuan et al. Message queuing telemetry transport (MQTT) security: A cryptographic smart card approach
CN1949765B (en) Method and system for obtaining SSH host computer public key of device being managed
CN110995642A (en) Providing secure connections using pre-shared keys
Thabit et al. Cryptography algorithms for enhancing IoT security
US20210211515A1 (en) MULTI-BIOMETRIC IoT BRIDGE
Hou et al. Design and prototype implementation of a blockchain-enabled LoRa system with edge computing
US11303453B2 (en) Method for securing communication without management of states
Girgenti et al. On the feasibility of attribute-based encryption on constrained IoT devices for smart systems
CN112383881B (en) Information reporting method, device, equipment and storage medium
CN112436936B (en) Cloud storage method and system with quantum encryption function
CN108173860A (en) A kind of MQTT connection methods, system, terminal and the server of low side constrained devices
CN114499990A (en) Vehicle control method, device, equipment and storage medium
Iqbal et al. The implementation of encryption algorithms in MQTT protocol for IoT constrained devices
CN107104888B (en) Safe instant messaging method
CN116980203A (en) Data processing method, device, terminal equipment and storage medium
Mededjel et al. A blockchain application prototype for the internet of things
Ortiz-Yepes Balsa: Bluetooth low energy application layer security add-on
Belej et al. Features of application of data transmission protocols in wireless networks of sensors
Raja et al. Internet of things: A research-oriented introductory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240131

Address after: 100091 School of military management, No. 3 academy a, hongshankou, Haidian District, Beijing

Applicant after: School of Military Management National Defense University of the People's Liberation Army of China

Country or region after: China

Address before: 100091 School of military management, No. 3 academy a, hongshankou, Haidian District, Beijing

Applicant before: Xia Wenxiang

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant