[go: up one dir, main page]

CN113115315B - IOT equipment behavior credible supervision method based on block chain - Google Patents

IOT equipment behavior credible supervision method based on block chain Download PDF

Info

Publication number
CN113115315B
CN113115315B CN202110365300.XA CN202110365300A CN113115315B CN 113115315 B CN113115315 B CN 113115315B CN 202110365300 A CN202110365300 A CN 202110365300A CN 113115315 B CN113115315 B CN 113115315B
Authority
CN
China
Prior art keywords
node
blockchain
nodes
reputation value
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110365300.XA
Other languages
Chinese (zh)
Other versions
CN113115315A (en
Inventor
冯云霞
陈泓达
李旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao University of Science and Technology
Original Assignee
Qingdao University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao University of Science and Technology filed Critical Qingdao University of Science and Technology
Priority to CN202110365300.XA priority Critical patent/CN113115315B/en
Publication of CN113115315A publication Critical patent/CN113115315A/en
Application granted granted Critical
Publication of CN113115315B publication Critical patent/CN113115315B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y20/00Information sensed or collected by the things
    • G16Y20/10Information sensed or collected by the things relating to the environment, e.g. temperature; relating to location
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Environmental & Geological Engineering (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明提出一种基于区块链的IOT设备行为可信监管方法,基于区块链、物联网技术,应用于物联网领域。针对目前物联网行业中存在的大量设备缺乏有效安全保护机制,易被攻击进而做出不可信行为的问题,设计了基于区块链的IOT设备监督管理网络架构,利用区块链技术对物联网节点进行监管,发现并处理做出不可信行为的节点,有效提高物联网设备的安全性。具体包括:在物联网平台上部署区块链,链上验证节点根据普通节点工作时产生的数据利用深度学习,神经网络等算法为普通节点生成综合信誉值,利用人工智能算法对各节点综合信誉值进行判定,将判定低于所设信誉值阈值的节点产生的不可信行为进行上报,并为后续采取相应管控操作提供支持。

Figure 202110365300

The invention proposes a blockchain-based trusted monitoring method for IOT device behavior, which is based on blockchain and Internet of Things technologies and is applied to the field of Internet of Things. Aiming at the problem that a large number of devices in the Internet of Things industry lack effective security protection mechanisms and are easily attacked and then make untrustworthy behaviors, a blockchain-based IOT device supervision and management network architecture is designed. Nodes supervise, discover and deal with nodes that make untrustworthy behaviors, and effectively improve the security of IoT devices. Specifically, it includes: deploying the blockchain on the IoT platform, validating nodes on the chain using deep learning based on the data generated by ordinary nodes, neural networks and other algorithms to generate comprehensive reputation values for ordinary nodes, and using artificial intelligence algorithms to comprehensively evaluate the reputation of each node. It will report the untrustworthy behavior generated by nodes that are judged to be lower than the set reputation value threshold, and provide support for subsequent corresponding management and control operations.

Figure 202110365300

Description

一种基于区块链的IOT设备行为可信监管方法A Trusted Supervision Method for IOT Device Behavior Based on Blockchain

技术领域technical field

本发明涉及区块链及物联网技术领域,是一种利用区块链技术对物联网网络节点行为进行监管的方案。该方案对所有物联网网络节点生成信誉值并记录在区块链上,对判定低于所设信誉值阈值的节点的不可信行为进行上报,并为后续采取相应管控操作提供支持。The invention relates to the technical field of blockchain and the Internet of Things, and is a scheme for using the blockchain technology to supervise the behavior of network nodes of the Internet of Things. The scheme generates a reputation value for all IoT network nodes and records it on the blockchain, reports the untrustworthy behavior of nodes that are judged to be lower than the set reputation value threshold, and provides support for subsequent corresponding management and control operations.

背景技术Background technique

随着进入大数据时代,物联网行业的高速发展使物联网技术开始大规模的运用在多个行业。由于物联网设备具有节点数量巨大、计算与存储能力脆弱、开放式环境等特点,基于成本和管理等多方面的因素,大量物联网设备被部署在无人监控的恶劣环境中,缺乏有效的安全保护机制,例如,家庭摄像头、智能灯、路灯监视器等。这些物联网设备容易被劫持。被劫持的物联网设备经常被恶意软件非法调用且肆意控制,致使网络节点发生拒绝服务、信息截取、注入大量冗余数据分组等异常行为,进而使不法分子达到破坏网络设备和篡改数据的目的。因此,对物联网网络节点的行为进行监管,对其传输信息进行可信度评价与监管,对网络安全具有重大意义。With the entry into the era of big data, the rapid development of the Internet of Things industry has led to the large-scale application of Internet of Things technology in many industries. Because IoT devices have the characteristics of huge number of nodes, fragile computing and storage capabilities, and open environment, based on factors such as cost and management, a large number of IoT devices are deployed in harsh environments that are unsupervised, lacking effective security. Protection mechanisms, e.g. home cameras, smart lights, street light monitors, etc. These IoT devices are prone to hijacking. Hijacked IoT devices are often illegally invoked and arbitrarily controlled by malware, resulting in abnormal behaviors such as denial of service, information interception, and injection of a large number of redundant data packets in network nodes, thereby enabling criminals to destroy network devices and tamper with data. Therefore, it is of great significance to network security to supervise the behavior of IoT network nodes, and to evaluate and supervise the credibility of their transmitted information.

为了解决这类问题,需要发现并禁止被劫持的物联网设备连接到通信网络,并在它们访问目标服务器之前就切断它们的网络连接。相关机构可以升级物联网,并将物联网与区块链连接起来,共同监控、标识和处理物联网设备的网络活动,保障并提升网络安全。To solve this type of problem, hijacked IoT devices need to be discovered and blocked from connecting to the communication network, and cut off from the network before they can access the target server. Relevant institutions can upgrade the Internet of Things and connect the Internet of Things with the blockchain to jointly monitor, identify and process the network activities of the Internet of Things devices to ensure and improve network security.

发明内容SUMMARY OF THE INVENTION

本发明的目的在于提供一种基于区块链的IOT设备行为可信监管方法,来解决上述背景技术中所提出的问题。The purpose of the present invention is to provide a blockchain-based trusted monitoring method for IOT device behavior to solve the problems raised in the above background technology.

为实现上述目的,本发明提供如下技术方案:To achieve the above object, the present invention provides the following technical solutions:

首先在物联网网络中部署区块链架构,并提供设备认证、基础权限控制功能。First, deploy the blockchain architecture in the IoT network, and provide device authentication and basic permission control functions.

为提高区块链并发性以适应节点数量巨大的物联网网络环境,本发明采取基于DAG有向无环图的区块链底层架构来替代传统区块链单链式底层架构。基于DAG有向无环图结构的区块链网络架构为多链式结构,可看作是传统单链式结构的横向拓展,各个节点或账户分别维护一条链以记录本地信息,各链之间通过交互引用构成基于平行链的DAG。账本内每个基本单元可以引用一至多个前驱单元,且可以同时被多个后继单元同时引用,这使得多个节点可以同时向帐本中新增交易或区块单元,从而大大提高系统吞吐量。由于此结构与传统单链式区块链结构类似,所以对于智能合约具有良好的支持性。本发明中每条单链由对等基站管理维护,本发明中假定基站可信。链上节点通过PBFT共识机制进行共识。每一条对等的单链作为一个节点簇,链上由验证节点与普通节点共同组成。簇与簇之间即链与链之间的验证节点根据预先设置的时间戳定时进行数据交互,以达到在整个物联网区块链网络中实现信息互联互通的目的。图1为基于DAG有向无环图的区块链结构示意图。In order to improve the concurrency of the blockchain to adapt to the Internet of Things network environment with a huge number of nodes, the present invention adopts the underlying architecture of the blockchain based on the DAG directed acyclic graph to replace the traditional single-chain underlying architecture of the blockchain. The blockchain network architecture based on the DAG directed acyclic graph structure is a multi-chain structure, which can be regarded as a horizontal expansion of the traditional single-chain structure. Each node or account maintains a chain to record local information. A parachain-based DAG is constructed by cross-referencing. Each basic unit in the ledger can reference one or more predecessor units, and can be referenced by multiple successor units at the same time, which enables multiple nodes to add transactions or block units to the ledger at the same time, thus greatly improving the system throughput . Since this structure is similar to the traditional single-chain blockchain structure, it has good support for smart contracts. In the present invention, each single chain is managed and maintained by a peer-to-peer base station, and it is assumed in the present invention that the base station is credible. The nodes on the chain conduct consensus through the PBFT consensus mechanism. Each peer-to-peer single chain acts as a node cluster, and the chain is composed of verification nodes and ordinary nodes. The verification nodes between clusters, that is, between chains, regularly exchange data according to preset timestamps, so as to achieve the purpose of information interconnection in the entire IoT blockchain network. Figure 1 is a schematic diagram of the blockchain structure based on the DAG directed acyclic graph.

物联网节点通过数据采集程序将工作时所产生的数据通过智能合约自动上传至区块链,达到数据安全不可篡改,可追溯的目的。物联网节点所采集的数据可以包括节点ID、时间、地点、事件、传输时延、数据分组转发量、数据分组重复率等等,具体由物联网设备节点所工作的环境而定。比如节点为环境传感器所采集到的数据可能包括温度、湿度、压力值等等。若物联网节点所收集到的数据包含温度、湿度、压力值等等,需要事先在智能合约中写入正常数值波动范围、阈值范围,以进行比较来判定节点是否出现异常或出现不可信行为,以此判定节点可信度。The IoT node automatically uploads the data generated during work to the blockchain through the data collection program through the smart contract, so as to achieve the purpose of data security, non-tampering and traceability. The data collected by the IoT node may include node ID, time, location, event, transmission delay, data packet forwarding volume, data packet repetition rate, etc., depending on the working environment of the IoT device node. For example, the data collected by the node for environmental sensors may include temperature, humidity, pressure values, and so on. If the data collected by the IoT node includes temperature, humidity, pressure value, etc., it is necessary to write the normal value fluctuation range and threshold range in the smart contract in advance to compare to determine whether the node has abnormal or untrustworthy behavior. Based on this, the reliability of the node is determined.

每条链上的物联网节点分为验证节点和普通节点两类。验证节点根据事先在链上所布置的智能合约根据每个物联网节点提交的数据计算,并生成每个节点的综合信誉值。综合信誉值由直接信誉值Ta,推荐信誉值Tf和历史信誉值Th进行加权计算得出,采用加权系数Q1、Q2、Q3,综合信誉值T可表示为T=Q1×Ta+Q2×Tf+Q3×Th,其中0<Q1≤Q2≤Q3<1,Q1+Q2+Q3=1。直接信誉值的评定标准由节点与节点之间通过交互事件触发和周期性相结合的方式产生的传输时延、数据分组转发量、数据分组重复率等指标组成。通过智能合约控制节点设备将收集到的数据与事先预设的正常数值范围进行比较,通过机器学习算法生成直接信誉值。由多个节点基于神经网络推送产生推荐信誉值。历史信誉值由长期统计生成,信任评估队列长度一定并按时更新,历史信誉值的加入使最后得出的综合结果更具客观性及稳定性。综合信誉值产生流程如图2所示。在产生推荐信任值时,为避免恶意节点发送虚假、冲突的推荐信任值有意抬高或贬低某个节点的推荐信任值,故将各信誉值与平均信誉值的距离作为权值,将与期望值越远的权重降的越低,尽可能排除恶意诽谤的可能性。首先计算全部推荐信誉值的平均值

Figure BDA0003004884370000021
然后计算信誉值与平均值的距离,进而判断推荐信誉值权重,第K个推荐信誉值mk的权重ck可表示为
Figure BDA0003004884370000022
所有推荐信誉值加权计算最终得到合并信誉值
Figure BDA0003004884370000023
The IoT nodes on each chain are divided into two categories: verification nodes and ordinary nodes. The verification node calculates according to the data submitted by each IoT node according to the smart contract arranged on the chain in advance, and generates the comprehensive reputation value of each node. The comprehensive reputation value is calculated by weighting the direct reputation value T a , the recommended reputation value T f and the historical reputation value Th , and using the weighting coefficients Q 1 , Q 2 , Q 3 , the comprehensive reputation value T can be expressed as T=Q 1 ×T a +Q 2 ×T f +Q 3 ×T h , where 0<Q 1 ≤Q 2 ≤Q 3 <1, and Q 1 +Q 2 +Q 3 =1. The evaluation standard of direct reputation value is composed of indicators such as transmission delay, data packet forwarding volume, and data packet repetition rate generated by the combination of interaction event triggering and periodicity between nodes. The node device is controlled by a smart contract to compare the collected data with a preset normal value range, and generate a direct reputation value through a machine learning algorithm. The recommendation reputation value is generated by multiple nodes based on neural network push. The historical reputation value is generated by long-term statistics. The length of the trust evaluation queue is fixed and updated on time. The addition of the historical reputation value makes the final comprehensive result more objective and stable. The comprehensive reputation value generation process is shown in Figure 2. When generating the recommendation trust value, in order to avoid malicious nodes sending false and conflicting recommendation trust values to intentionally raise or degrade the recommendation trust value of a node, the distance between each reputation value and the average reputation value is used as the weight, and the distance between each reputation value and the average reputation value is used as the weight, and the expected value The farther the weight is, the lower the weight is, and the possibility of malicious slander is excluded as much as possible. First calculate the average of all recommended reputation values
Figure BDA0003004884370000021
Then calculate the distance between the reputation value and the average value, and then judge the weight of the recommended reputation value. The weight ck of the Kth recommended reputation value m k can be expressed as
Figure BDA0003004884370000022
The weighted calculation of all recommended reputation values finally obtains the combined reputation value
Figure BDA0003004884370000023

在普通节点信誉评估中,验证节点通过以往该节点的历史行为来评价此节点的综合信誉值,生成行为判定报告,基于PBFT进行本簇内共识,将不可信行为进行记录并做出相应惩罚,并且同时管理本簇内的所有节点。验证节点层通过基站来管理,本发明内假定基站可信。基站利用人工智能技术通过节点历史行为评价其信誉值,并选择高信誉值节点作为验证节点,并每隔一段时间进行信誉值更新,发现节点信誉值低于门限值,即撤销其验证节点,重新选择高信誉值节点作为验证节点。验证节点同时计算本簇群的信誉值作为整个簇群的参考,当簇群信誉值低于门限值时,将整个簇群从网络中去除,部署新的节点。这一切由已经部署在物联网区块链上的智能合约自动执行。In the common node reputation evaluation, the verification node evaluates the comprehensive reputation value of the node through the past historical behavior of the node, generates a behavior judgment report, conducts consensus within the cluster based on PBFT, records the untrustworthy behavior and makes corresponding penalties. And manage all nodes in the cluster at the same time. The verification node layer is managed by the base station, which is assumed to be credible in the present invention. The base station uses artificial intelligence technology to evaluate its reputation value through the historical behavior of nodes, and selects nodes with high reputation value as verification nodes, and updates the reputation value at regular intervals. Re-select the high reputation value node as the verification node. The verification node also calculates the reputation value of the cluster as a reference for the entire cluster. When the reputation value of the cluster is lower than the threshold value, the entire cluster is removed from the network and a new node is deployed. This is all performed automatically by smart contracts already deployed on the IoT blockchain.

本发明提出的基于区块链的IOT设备行为可信监管方法,通过部署的访问控制功能模块,对许可用户的数据操作进行记录,保证相关数据操作具有可追溯性。The blockchain-based trusted monitoring method for IOT device behavior proposed by the present invention records the data operations of licensed users through the deployed access control function module, so as to ensure the traceability of relevant data operations.

验证节点利用大数据技术定期将已确认处理的不可信信息进行汇总,并生成可视化报表,方便管理人员对整个物联网网络安全情况进行审查监管。The verification node uses big data technology to regularly summarize the untrusted information that has been confirmed and processed, and generate a visual report, which is convenient for managers to review and supervise the security of the entire Internet of Things network.

由以上本发明的内容可知,本发明与现有物联网网络方案相比,具有以下优势和有益的效果:As can be seen from the above content of the present invention, the present invention has the following advantages and beneficial effects compared with the existing Internet of Things network solution:

1.利用区块链技术,可以使用加密技术和安全算法来保护数字身份,从而构建物联网环境下更加安全便捷的数字身份认证系统。数字身份在上链之前需要通过认证机构(例如:政府、企业等)的认证与信用背书,上链之后,基于区块链的数字身份认证系统保障数字身份信息的真实性,并提供可信的认证服务。物联网中每个设备都有自己的区块链地址,可以根据特定的地址进行注册,从而保护其数字身份不受其他设备的影响。1. Using blockchain technology, encryption technology and security algorithms can be used to protect digital identities, so as to build a more secure and convenient digital identity authentication system in the Internet of Things environment. Before the digital identity is put on the chain, it needs to pass the certification and credit endorsement of the certification body (such as the government, enterprises, etc.). After the chain is put on the chain, the digital identity authentication system based on the blockchain guarantees the authenticity of the digital identity information and provides credible information. Certification Services. Each device in the IoT has its own blockchain address, which can be registered against a specific address, thus protecting its digital identity from other devices.

2.使用区块链技术构建物联网应用平台,可“去中心化”地将各类物联网相关的设备、网关、服务等有效连接融合,促进其相互协作,有效避免由单一节点失败而导致整个网络崩溃问题。打通物理与虚拟世界,降低成本的同时,极大限度的满足信任建立、交易加速、海量连接等需求。2. The use of blockchain technology to build an IoT application platform can "decentralize" the effective connection and integration of various IoT-related devices, gateways, services, etc., promote their mutual cooperation, and effectively avoid the failure of a single node. The whole network crashes problem. Open up the physical and virtual worlds, reduce costs, and meet the needs of trust establishment, transaction acceleration, and massive connections to the greatest extent possible.

3.区块链中分布式账本具有防篡改特性,能有效降低物联网网络中任何单一节点设备被恶意攻击和控制后带来的信息泄露和恶意操控风险。利用区块链技术组建和管理物联网网络,能及时掌控网络中各种生产制造设备的状态以及参与分工协作的各相关方的状态,提高设备的利用率和维护效率,从而能提供更加精准、高效的供应链服务。3. The distributed ledger in the blockchain has the characteristics of anti-tampering, which can effectively reduce the risk of information leakage and malicious manipulation caused by any single node device in the IoT network being maliciously attacked and controlled. The use of blockchain technology to build and manage the Internet of Things network can timely control the status of various manufacturing equipment in the network and the status of all parties involved in the division of labor and collaboration, improve equipment utilization and maintenance efficiency, and provide more accurate, Efficient supply chain services.

4.区块链可为物联网提供信任机制,保证所有权、交易等记录的可信性、可靠性及透明性,同时,还可为用户隐私提供保障机制,从而有效解决物联网发展面临的大数据管理、信任、安全和隐私等问题,推进物联网向更加灵活化、智能化的高级形态演进。4. The blockchain can provide a trust mechanism for the Internet of Things to ensure the credibility, reliability and transparency of records such as ownership and transactions. At the same time, it can also provide a protection mechanism for user privacy, so as to effectively solve the problems faced by the development of the Internet of Things. Issues such as data management, trust, security, and privacy promote the evolution of the Internet of Things to a more flexible and intelligent advanced form.

5.当物联网业务以智能合约的方式部署在物联网区块链上时,物联网设备可以在物联网区块链上通过查寻和执行相关智能合约来访问对应的物联网业务。当物联网业务部署在物联网区块链外部时,物联网设备可以通过物联网区块链查寻和执行相关辅助性智能合约以获得访问物联网业务的访问许可,然后与对应的物联网业务直接交互;同时,根据物联网业务的需求,物联网业务和物联网设备可以把双方交互的结果数据存储在物联网区块链上。5. When the IoT business is deployed on the IoT blockchain in the form of smart contracts, IoT devices can access the corresponding IoT business by searching and executing relevant smart contracts on the IoT blockchain. When the IoT business is deployed outside the IoT blockchain, the IoT device can search and execute related auxiliary smart contracts through the IoT blockchain to obtain the access permission to access the IoT business, and then directly communicate with the corresponding IoT business. At the same time, according to the needs of the IoT business, the IoT business and the IoT device can store the result data of the interaction between the two parties on the IoT blockchain.

附图说明Description of drawings

图1为基于DAG有向无环图的区块链结构示意图;Figure 1 is a schematic diagram of the blockchain structure based on the DAG directed acyclic graph;

图2为综合信誉值产生流程示意图;Figure 2 is a schematic diagram of the generation process of the comprehensive reputation value;

图3为IOT设备节点部署示意图。Figure 3 is a schematic diagram of IOT device node deployment.

具体实施方式Detailed ways

下面以公司智慧办公所用到的智能IOT设备为例,说明本发明实现过程。假设该方案包括智能门锁、智能开关、智能插座、智能灯光、智能音箱、智能空调、智能热水器、智能冰箱、智能环境传感器、智能扫地机器人、智能网关、智能安防报警器、摄像头等等IOT设备,这些设备所采用的通信协议往往非常简单,极容易被入侵。The implementation process of the present invention is described below by taking the intelligent IOT device used in the company's intelligent office as an example. Suppose the solution includes smart door locks, smart switches, smart sockets, smart lights, smart speakers, smart air conditioners, smart water heaters, smart refrigerators, smart environmental sensors, smart sweeping robots, smart gateways, smart security alarms, cameras, etc. IOT devices , the communication protocols used by these devices are often very simple and easily hacked.

在本方案实施时,以公司内部部门分类为标准进行划分,将公司拆分为多个部分,由每个部门内自行设立一台服务器,建立并维护一个区块链网络,由各部门所各自维护的区块链共同组成基于DAG有向无环图结构的区块链架构,覆盖整个公司IOT智能设备网络,基于DAG有向无环图的区块链结构如图1所示。部门内通过区块链技术,基于密码学及签名机制对本部门内所使用的智能IOT设备进行安全认证;通过智能合约的形式,规定智能IOT设备访问及其他行为权限;通过为每个IOT设备设立统一的数字身份ID标识,使设备间能互相识别验证,达到互联互通的目的。IOT设备部署示意图如图3所示。下面以链上节点之一摄像头设备为例,讲述本发明专利的部署及实施流程。During the implementation of this plan, the company's internal department classification is used as the standard to divide the company into multiple parts. Each department will set up a server on its own to establish and maintain a blockchain network. The maintained blockchains together form a blockchain architecture based on the DAG directed acyclic graph structure, covering the entire company's IOT smart device network. The blockchain structure based on the DAG directed acyclic graph is shown in Figure 1. The department uses blockchain technology to conduct security authentication for the smart IOT devices used in the department based on cryptography and signature mechanism; through the form of smart contracts, the access and other behavior permissions of smart IOT devices are stipulated; The unified digital ID identification enables devices to identify and verify each other, and achieve the purpose of interconnection. The schematic diagram of IOT equipment deployment is shown in Figure 3. The following describes the deployment and implementation process of the patent of the present invention by taking a camera device of one of the nodes on the chain as an example.

(1)部门服务器将摄像头设备上链,并为其生成一个基于区块链的身份ID以及一个加密私钥。生成后若用户需要获取摄像头设备管理权限必须进行登录,登录必须输入私钥,若私钥丢失任何人都将失去对数据的访问权限,此时需要联系部门管理人员解决。任何有关该摄像头设备的操作行为都将被上链记录且不可篡改。(1) The department server puts the camera device on the chain, and generates a blockchain-based identity ID and an encrypted private key for it. After generation, if the user needs to obtain the management authority of the camera device, he must log in, and the private key must be entered to log in. If the private key is lost, anyone will lose the access authority to the data. Any operation of the camera device will be recorded on the chain and cannot be tampered with.

(2)链上节点分为验证节点与普通节点,假定该摄像头设备节点为普通节点。首先通过设备节点部署的数据采集程序将摄像头设备在工作时产生的传输时延、数据分组转发量、数据分组重复率信息收集并记录在区块链上,智能合约根据事先所设定的各类数据指标阈值进行对比计算,基于机器学习算法生成直接信誉值;由链上相邻设备节点基于神经网络算法互相推送产生推荐信誉值;本节点长期将每次生成的信誉值记录在区块链上形成历史信誉值队列。三种信誉值由验证节点根据链上智能合约进行加权计算,生成综合信誉值,具体产生流程由图2所示。(2) The nodes on the chain are divided into verification nodes and ordinary nodes. It is assumed that the camera device node is an ordinary node. First, through the data acquisition program deployed by the device node, the transmission delay, data packet forwarding volume, and data packet repetition rate information generated by the camera equipment during operation are collected and recorded on the blockchain. The data indicator thresholds are compared and calculated, and the direct reputation value is generated based on the machine learning algorithm; the recommended reputation value is generated by the adjacent device nodes on the chain based on the neural network algorithm; the node records the generated reputation value each time on the blockchain for a long time. Form a queue of historical reputation values. The three types of reputation values are weighted and calculated by the verification node according to the smart contract on the chain to generate a comprehensive reputation value. The specific generation process is shown in Figure 2.

(3)综合信誉值作为评判该摄像头设备节点是否具有不可信行为的标准,在生成后基于PBFT进行全网共识并记录在区块链上,由验证节点基于智能合约,根据所生成的综合信誉值高低,利用人工智能技术对该节点是否具有不可信行为进行判断。(3) The comprehensive reputation value is used as the criterion for judging whether the camera device node has untrustworthy behavior. After generation, the whole network consensus is carried out based on PBFT and recorded on the blockchain. The verification node is based on the smart contract, according to the generated comprehensive reputation The value is high or low, and artificial intelligence technology is used to judge whether the node has untrustworthy behavior.

(4)若最终得出综合信誉值高于预先所设定的信誉值阈值,则判定该摄像头设备节点没有异常,即没有产生不可信行为,此时对该摄像头设备节点的历史信誉值评估队列进行更新,保持队列长度不变;若最终得出综合信誉值低于预先所设定的信誉值阈值,在次数不超过10次的情况下利用机器学习算法做不同程度的降低历史信誉分的处理,超过10次则直接将该设备节点下线,进行维修或做直接抛弃处理,处理完成后根据具体情况考虑是否对设备进行二次上链使用。具体次数可按照具体情况进行改变。(4) If it is finally concluded that the comprehensive reputation value is higher than the preset reputation value threshold, it is determined that the camera device node is not abnormal, that is, no untrustworthy behavior occurs, and the historical reputation value evaluation queue of the camera device node is at this time. Update and keep the queue length unchanged; if the final comprehensive reputation value is lower than the pre-set reputation value threshold, the machine learning algorithm is used to reduce the historical reputation score to different degrees under the condition that the number of times does not exceed 10 times. , if it exceeds 10 times, the device node will be directly offline for maintenance or direct disposal. After the processing is completed, it will be considered whether to use the device on the chain for a second time according to the specific situation. The specific number of times can be changed according to the specific situation.

(5)部门服务器统一管理验证节点层。服务器利用人工智能技术选择高信誉值节点作为验证节点,并每隔一段时间进行信誉值更新,发现节点信誉值低于门限值,即撤销其验证节点,重新选择高信誉值节点作为验证节点。(5) The department server manages the verification node layer uniformly. The server uses artificial intelligence technology to select nodes with high reputation value as verification nodes, and updates the reputation value at regular intervals. If the reputation value of the node is found to be lower than the threshold value, it revokes its verification node, and re-selects the high reputation value node as the verification node.

(6)验证节点通过大数据技术定期将已确认处理的不可信信息进行汇总,并生成可视化报表,方便管理人员对整个物联网网络安全情况进行审查监管。(6) The verification node regularly summarizes the untrusted information that has been confirmed and processed through big data technology, and generates a visual report, which is convenient for managers to review and supervise the security of the entire Internet of Things network.

Claims (10)

1.一种基于区块链的IOT设备行为可信监管方法,其特征在于利用区块链技术对物联网中IOT设备行为进行监管,及时发现不可信行为并进行处理,对IOT设备提供安全保护机制,包括以下步骤:1. A blockchain-based trusted monitoring method for IOT device behavior, characterized in that the blockchain technology is used to supervise the behavior of IOT devices in the Internet of Things, to discover and deal with untrustworthy behaviors in a timely manner, and to provide security protection for the IOT devices mechanism, including the following steps: S1、在物联网设备网络中部署基于DAG有向无环图的区块链架构,并提供设备认证、基础权限控制功能;S1. Deploy the blockchain architecture based on the DAG directed acyclic graph in the IoT device network, and provide device authentication and basic permission control functions; S2、物联网设备将自身工作产生的数据通过实时或离线方式写入区块链分布式账本;S2. The IoT device writes the data generated by its own work into the blockchain distributed ledger in real-time or offline; S3、共识机制采用PBFT共识,保证上链数据不可篡改;S3. The consensus mechanism adopts PBFT consensus to ensure that the data on the chain cannot be tampered with; S4、部署访问控制功能,对许可用户的数据操作进行记录,保证相关数据操作具有可追溯性;S4. Deploy access control functions to record data operations of licensed users to ensure traceability of relevant data operations; S5、由事先在链上所部署的智能合约根据所写入数据的指标为每个物联网节点计算生成综合信誉值;S5. The smart contract deployed on the chain in advance calculates and generates a comprehensive reputation value for each IoT node according to the indicators of the written data; S6、链上验证节点根据所生成的综合信誉值高低对每个节点是否具有不可信行为进行判断,若信誉值低于事先所设置的信誉值阈值,则判定该节点具有不可信行为并作出惩罚;S6. The verification node on the chain judges whether each node has untrustworthy behavior according to the generated comprehensive reputation value. If the reputation value is lower than the pre-set reputation value threshold, it is judged that the node has untrustworthy behavior and punishes it. ; S7、验证节点定期将已确认处理的不可信信息进行汇总,并生成可视化报表,供管理人员进行审查监管。S7. The verification node regularly summarizes the untrusted information that has been confirmed and processed, and generates a visual report for the management personnel to review and supervise. 2.如权利要求1所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,在步骤S1中,所述部署的基于DAG有向无环图结构的区块链网络架构为多链式结构,可看作是传统单链式结构的横向拓展,账本内每个基本单元可以引用一至多个前驱单元,且可以同时被多个后继单元同时引用,每条单链由对等可信基站维护,链上节点通过PBFT机制进行共识。2. A blockchain-based trusted monitoring method for IOT device behavior as claimed in claim 1, characterized in that, in step S1, the deployed blockchain network based on DAG directed acyclic graph structure The architecture is a multi-chain structure, which can be regarded as a horizontal expansion of the traditional single-chain structure. Each basic unit in the ledger can reference one or more predecessor units, and can be referenced by multiple successor units at the same time. Peer-to-peer trusted base stations are maintained, and nodes on the chain conduct consensus through the PBFT mechanism. 3.如权利要求1所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,在步骤S2中物联网节点所采集的数据包括节点ID、时间、地点、事件、传输时延、数据分组转发量、数据分组重复率。3. a kind of blockchain-based IOT device behavior credible supervision method as claimed in claim 1 is characterized in that, in step S2, the data collected by the Internet of Things node includes node ID, time, location, event, transmission Delay, data packet forwarding volume, data packet repetition rate. 4.如权利要求1所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,在步骤S4中设立访问规则,对许可用户实施严格的权限控制,将许可用户对数据处理操作记录上链保存记录。4. a kind of blockchain-based IOT device behavior credible supervision method as claimed in claim 1, is characterized in that, in step S4, set up access rules, implement strict authority control to licensed users, and allow users to control data. The processing operation record is uploaded to the chain to save the record. 5.如权利要求1所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,在步骤S5中,综合信誉值由直接信誉值,推荐信誉值和历史信誉值进行加权计算得出,直接信誉值的评定标准由节点与节点之间通过交互事件触发和周期性相结合的方式产生的传输时延、数据分组转发量、数据分组重复率指标组成,通过智能合约控制节点设备将收集到的数据与事先预设的正常数值范围进行比较,生成直接信誉值,推荐信誉值由多个节点同时推送产生,历史信誉值由长期统计生成,信任评估队列长度固定并按时更新。5. A blockchain-based trusted monitoring method for IOT device behavior as claimed in claim 1, wherein in step S5, the comprehensive reputation value is weighted by the direct reputation value, the recommended reputation value and the historical reputation value It is calculated that the evaluation standard of the direct reputation value is composed of the transmission delay, data packet forwarding volume, and data packet repetition rate indicators generated by the combination of interactive event triggering and periodicity between nodes, and the nodes are controlled by smart contracts. The device compares the collected data with the preset normal value range to generate a direct reputation value. The recommended reputation value is generated by multiple nodes at the same time, and the historical reputation value is generated by long-term statistics. The length of the trust evaluation queue is fixed and updated on time. 6.如权利要求5所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,产生推荐信任值时,为避免恶意节点发送虚假、冲突的推荐信任值有意抬高或贬低某个节点的推荐信任值,故将各节点信誉值与平均信誉值的距离作为权值,将与期望值越远的节点所提供的推荐信誉值权重降的越低。6. A blockchain-based trusted monitoring method for IOT device behavior as claimed in claim 5, characterized in that, when generating a recommended trust value, in order to avoid malicious nodes from sending false and conflicting recommended trust values, the value is intentionally elevated or To degrade the recommendation trust value of a node, the distance between the reputation value of each node and the average reputation value is used as the weight, and the weight of the recommendation reputation value provided by the node farther from the expected value is reduced the lower. 7.如权利要求1所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,在步骤S6中,物联网节点被分为两类,验证节点和普通节点,在普通节点信誉评估中,验证节点通过以往该节点的历史行为来评价此节点的综合信誉值,生成行为判定报告,基于PBFT进行本簇内共识,将不可信行为进行记录并做出相应惩罚,并且同时管理本簇内的所有节点。7. A blockchain-based trusted monitoring method for IOT device behavior as claimed in claim 1, characterized in that, in step S6, IoT nodes are divided into two categories, verification nodes and common nodes. In the node reputation evaluation, the verification node evaluates the comprehensive reputation value of the node through the past historical behavior of the node, generates a behavior judgment report, conducts consensus within the cluster based on PBFT, records the untrustworthy behavior and makes corresponding penalties, and at the same time. Manage all nodes in this cluster. 8.如权利要求7所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,采用基于DAG有向无环图的多链式区块链结构替代传统单链式区块链结构,每一条链作为一个节点簇,簇与簇之间即链与链之间的验证节点根据预先设置的时间戳定时进行数据交互,使链间数据互通。8. A blockchain-based trusted monitoring method for IOT device behavior as claimed in claim 7, wherein a multi-chain blockchain structure based on a DAG directed acyclic graph is used to replace the traditional single-chain region In the blockchain structure, each chain acts as a node cluster, and the verification nodes between the clusters, that is, the verification nodes between the chains, regularly exchange data according to the preset time stamp, so that the data between the chains can be exchanged. 9.如权利要求7所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,验证节点层通过基站来管理,基站通过节点历史行为评价其信誉值,并选择高信誉值节点作为验证节点,并每隔一段时间进行信誉值更新,发现节点信誉值低于门限值,即撤销其验证节点,重新选择高信誉值节点作为验证节点。9. A blockchain-based trusted monitoring method for IOT device behavior as claimed in claim 7, characterized in that the verification node layer is managed by the base station, and the base station evaluates its reputation value through the node's historical behavior, and selects a high reputation The value node is used as the verification node, and the reputation value is updated at regular intervals. If the node reputation value is found to be lower than the threshold value, the verification node is revoked, and the high reputation value node is re-selected as the verification node. 10.如权利要求7所述的一种基于区块链的IOT设备行为可信监管方法,其特征在于,验证节点同时计算本簇群的信誉值作为整个簇群的参考,当簇群信誉值低于门限值时,将整个簇群从网络中去除,部署新的节点。10. A blockchain-based trusted monitoring method for IOT device behavior as claimed in claim 7, wherein the verification node simultaneously calculates the reputation value of the cluster as a reference for the entire cluster, and when the cluster reputation value is Below the threshold, the entire cluster is removed from the network and new nodes are deployed.
CN202110365300.XA 2021-04-02 2021-04-02 IOT equipment behavior credible supervision method based on block chain Active CN113115315B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110365300.XA CN113115315B (en) 2021-04-02 2021-04-02 IOT equipment behavior credible supervision method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110365300.XA CN113115315B (en) 2021-04-02 2021-04-02 IOT equipment behavior credible supervision method based on block chain

Publications (2)

Publication Number Publication Date
CN113115315A CN113115315A (en) 2021-07-13
CN113115315B true CN113115315B (en) 2022-10-04

Family

ID=76713933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110365300.XA Active CN113115315B (en) 2021-04-02 2021-04-02 IOT equipment behavior credible supervision method based on block chain

Country Status (1)

Country Link
CN (1) CN113115315B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113839945B (en) * 2021-09-23 2023-05-19 北京交通大学 An identity-based trusted access control system and method
CN113949642B (en) * 2021-10-19 2025-05-23 中国电子科技集团公司第二十研究所 Block chain storage-based trust evaluation method for sensor nodes of Internet of things
CN114389902B (en) * 2022-03-24 2022-06-10 北京中科金财科技股份有限公司 Block chain-based network security monitoring method and system
CN114756561B (en) * 2022-04-26 2025-08-12 蚂蚁区块链科技(上海)有限公司 Transaction execution method and device and electronic equipment
CN116846674B (en) * 2023-05-16 2025-03-18 北京邮电大学 A high-throughput distributed ledger system based on DAG
CN116582853B (en) * 2023-06-02 2025-08-22 电子科技大学 A trusted data collection method based on lightweight blockchain for the Internet of Things
CN116827488B (en) * 2023-08-30 2024-01-05 广东电网有限责任公司东莞供电局 Power data transmission control method and device based on block chain and storage medium
CN117951140A (en) * 2024-03-25 2024-04-30 成都秦川物联网科技股份有限公司 Industrial Internet of things sub-service platform data interaction system
CN118552215A (en) * 2024-07-24 2024-08-27 广州锐嘉工业股份有限公司 A blockchain-based drug packaging production traceability management system
CN119544203A (en) * 2024-11-08 2025-02-28 中移物联网有限公司 A method, device, equipment, medium and product for registering information of Internet of Vehicles card

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995448A (en) * 2019-12-19 2020-04-10 杭州羿贝科技有限公司 Block chain-based Internet of things equipment identity authentication method and system
CN111949672A (en) * 2020-07-30 2020-11-17 杭州电子科技大学 A blockchain storage method that supports incremental update of IoT data

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3596880B1 (en) * 2017-04-18 2022-06-01 Samsung Electronics Co., Ltd. Method and apparatus for access control in distributed blockchain-based internet of things (iot) network
CN109544334B (en) * 2018-10-22 2020-09-29 深圳市哈希树科技有限公司 Method for realizing network extensible block chain
EP3673620B8 (en) * 2019-07-11 2022-02-16 Advanced New Technologies Co., Ltd. Shared blockchain data storage
CN110784346B (en) * 2019-10-18 2022-07-29 深圳供电局有限公司 Reputation value-based PBFT consensus system and method
CN111080288B (en) * 2019-10-18 2023-08-18 湖南天河国云科技有限公司 Block chain consensus achieving method and device based on directed acyclic graph
CN111181946B (en) * 2019-12-24 2021-05-18 浙江大学 A trusted traceability system and method based on blockchain and the Internet of Things
CN111246474B (en) * 2020-01-10 2022-08-23 中国联合网络通信集团有限公司 Base station authentication method and device
CN111355780B (en) * 2020-02-18 2022-09-13 杭州云象网络技术有限公司 Internet of things monitoring management method and system based on block chain
CN111510502A (en) * 2020-04-28 2020-08-07 吉林科创电力有限公司 PBFT consensus propagation optimization method based on dynamic reputation value
CN112417494B (en) * 2020-10-26 2024-12-10 国网浙江省电力有限公司电力科学研究院 Power blockchain system based on trusted computing
CN112511315A (en) * 2020-12-03 2021-03-16 重庆邮电大学 Industrial Internet of things authentication method based on DAG block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995448A (en) * 2019-12-19 2020-04-10 杭州羿贝科技有限公司 Block chain-based Internet of things equipment identity authentication method and system
CN111949672A (en) * 2020-07-30 2020-11-17 杭州电子科技大学 A blockchain storage method that supports incremental update of IoT data

Also Published As

Publication number Publication date
CN113115315A (en) 2021-07-13

Similar Documents

Publication Publication Date Title
CN113115315B (en) IOT equipment behavior credible supervision method based on block chain
Da Xu et al. Embedding blockchain technology into IoT for security: A survey
Sharma et al. Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks
Wang et al. Blockchain-based data storage mechanism for industrial internet of things
Alcaraz et al. Security aspects of SCADA and DCS environments
Tukur et al. Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things
CN112073431B (en) Security defense method and system for industrial control system network
CN117040896A (en) Internet of things management method and Internet of things management platform
Sarjan et al. Cyber-security of industrial internet of things in electric power systems
De Benedictis et al. Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security
CN111444262A (en) Electric power data sharing system based on block chain
CN119030681A (en) Blockchain intelligent decision-making system based on arbitration mechanism
CN117354317A (en) Audit-based cross-chain bridge management system
Adebayo et al. Blockchain Technology: A Panacea for IoT Security Challenge.
CN118349979A (en) A user information security processing control system for smart medical care
Singh Cybersecurity for Smart Cities Protecting Infrastructure in the Era of Digitalization
CN120263387A (en) Cross-domain collaborative analysis method of trusted data space based on privacy computing
Xu et al. Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
Alshammari Securing smart microgrids with a novel multi-layer cybersecurity framework for Industry 4.0 renewable energy systems
CN119599679A (en) Block chain-based intelligent protection method and system for financial transaction data
Yu et al. EviChain: A scalable blockchain for accountable intelligent surveillance systems
Bourian et al. SSHCEth: Secure smart home communications based on ethereum blockchain and smart contract
Zhang et al. A dynamic security control architecture for industrial cyber-physical system
US20230138200A1 (en) Security management method and system for blended environment
CN114710796A (en) Sensor abnormity detection method, device and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant