CN113115315B - IOT equipment behavior credible supervision method based on block chain - Google Patents
IOT equipment behavior credible supervision method based on block chain Download PDFInfo
- Publication number
- CN113115315B CN113115315B CN202110365300.XA CN202110365300A CN113115315B CN 113115315 B CN113115315 B CN 113115315B CN 202110365300 A CN202110365300 A CN 202110365300A CN 113115315 B CN113115315 B CN 113115315B
- Authority
- CN
- China
- Prior art keywords
- node
- blockchain
- nodes
- reputation value
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y20/00—Information sensed or collected by the things
- G16Y20/10—Information sensed or collected by the things relating to the environment, e.g. temperature; relating to location
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Environmental & Geological Engineering (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Computer And Data Communications (AREA)
Abstract
本发明提出一种基于区块链的IOT设备行为可信监管方法,基于区块链、物联网技术,应用于物联网领域。针对目前物联网行业中存在的大量设备缺乏有效安全保护机制,易被攻击进而做出不可信行为的问题,设计了基于区块链的IOT设备监督管理网络架构,利用区块链技术对物联网节点进行监管,发现并处理做出不可信行为的节点,有效提高物联网设备的安全性。具体包括:在物联网平台上部署区块链,链上验证节点根据普通节点工作时产生的数据利用深度学习,神经网络等算法为普通节点生成综合信誉值,利用人工智能算法对各节点综合信誉值进行判定,将判定低于所设信誉值阈值的节点产生的不可信行为进行上报,并为后续采取相应管控操作提供支持。
The invention proposes a blockchain-based trusted monitoring method for IOT device behavior, which is based on blockchain and Internet of Things technologies and is applied to the field of Internet of Things. Aiming at the problem that a large number of devices in the Internet of Things industry lack effective security protection mechanisms and are easily attacked and then make untrustworthy behaviors, a blockchain-based IOT device supervision and management network architecture is designed. Nodes supervise, discover and deal with nodes that make untrustworthy behaviors, and effectively improve the security of IoT devices. Specifically, it includes: deploying the blockchain on the IoT platform, validating nodes on the chain using deep learning based on the data generated by ordinary nodes, neural networks and other algorithms to generate comprehensive reputation values for ordinary nodes, and using artificial intelligence algorithms to comprehensively evaluate the reputation of each node. It will report the untrustworthy behavior generated by nodes that are judged to be lower than the set reputation value threshold, and provide support for subsequent corresponding management and control operations.
Description
技术领域technical field
本发明涉及区块链及物联网技术领域,是一种利用区块链技术对物联网网络节点行为进行监管的方案。该方案对所有物联网网络节点生成信誉值并记录在区块链上,对判定低于所设信誉值阈值的节点的不可信行为进行上报,并为后续采取相应管控操作提供支持。The invention relates to the technical field of blockchain and the Internet of Things, and is a scheme for using the blockchain technology to supervise the behavior of network nodes of the Internet of Things. The scheme generates a reputation value for all IoT network nodes and records it on the blockchain, reports the untrustworthy behavior of nodes that are judged to be lower than the set reputation value threshold, and provides support for subsequent corresponding management and control operations.
背景技术Background technique
随着进入大数据时代,物联网行业的高速发展使物联网技术开始大规模的运用在多个行业。由于物联网设备具有节点数量巨大、计算与存储能力脆弱、开放式环境等特点,基于成本和管理等多方面的因素,大量物联网设备被部署在无人监控的恶劣环境中,缺乏有效的安全保护机制,例如,家庭摄像头、智能灯、路灯监视器等。这些物联网设备容易被劫持。被劫持的物联网设备经常被恶意软件非法调用且肆意控制,致使网络节点发生拒绝服务、信息截取、注入大量冗余数据分组等异常行为,进而使不法分子达到破坏网络设备和篡改数据的目的。因此,对物联网网络节点的行为进行监管,对其传输信息进行可信度评价与监管,对网络安全具有重大意义。With the entry into the era of big data, the rapid development of the Internet of Things industry has led to the large-scale application of Internet of Things technology in many industries. Because IoT devices have the characteristics of huge number of nodes, fragile computing and storage capabilities, and open environment, based on factors such as cost and management, a large number of IoT devices are deployed in harsh environments that are unsupervised, lacking effective security. Protection mechanisms, e.g. home cameras, smart lights, street light monitors, etc. These IoT devices are prone to hijacking. Hijacked IoT devices are often illegally invoked and arbitrarily controlled by malware, resulting in abnormal behaviors such as denial of service, information interception, and injection of a large number of redundant data packets in network nodes, thereby enabling criminals to destroy network devices and tamper with data. Therefore, it is of great significance to network security to supervise the behavior of IoT network nodes, and to evaluate and supervise the credibility of their transmitted information.
为了解决这类问题,需要发现并禁止被劫持的物联网设备连接到通信网络,并在它们访问目标服务器之前就切断它们的网络连接。相关机构可以升级物联网,并将物联网与区块链连接起来,共同监控、标识和处理物联网设备的网络活动,保障并提升网络安全。To solve this type of problem, hijacked IoT devices need to be discovered and blocked from connecting to the communication network, and cut off from the network before they can access the target server. Relevant institutions can upgrade the Internet of Things and connect the Internet of Things with the blockchain to jointly monitor, identify and process the network activities of the Internet of Things devices to ensure and improve network security.
发明内容SUMMARY OF THE INVENTION
本发明的目的在于提供一种基于区块链的IOT设备行为可信监管方法,来解决上述背景技术中所提出的问题。The purpose of the present invention is to provide a blockchain-based trusted monitoring method for IOT device behavior to solve the problems raised in the above background technology.
为实现上述目的,本发明提供如下技术方案:To achieve the above object, the present invention provides the following technical solutions:
首先在物联网网络中部署区块链架构,并提供设备认证、基础权限控制功能。First, deploy the blockchain architecture in the IoT network, and provide device authentication and basic permission control functions.
为提高区块链并发性以适应节点数量巨大的物联网网络环境,本发明采取基于DAG有向无环图的区块链底层架构来替代传统区块链单链式底层架构。基于DAG有向无环图结构的区块链网络架构为多链式结构,可看作是传统单链式结构的横向拓展,各个节点或账户分别维护一条链以记录本地信息,各链之间通过交互引用构成基于平行链的DAG。账本内每个基本单元可以引用一至多个前驱单元,且可以同时被多个后继单元同时引用,这使得多个节点可以同时向帐本中新增交易或区块单元,从而大大提高系统吞吐量。由于此结构与传统单链式区块链结构类似,所以对于智能合约具有良好的支持性。本发明中每条单链由对等基站管理维护,本发明中假定基站可信。链上节点通过PBFT共识机制进行共识。每一条对等的单链作为一个节点簇,链上由验证节点与普通节点共同组成。簇与簇之间即链与链之间的验证节点根据预先设置的时间戳定时进行数据交互,以达到在整个物联网区块链网络中实现信息互联互通的目的。图1为基于DAG有向无环图的区块链结构示意图。In order to improve the concurrency of the blockchain to adapt to the Internet of Things network environment with a huge number of nodes, the present invention adopts the underlying architecture of the blockchain based on the DAG directed acyclic graph to replace the traditional single-chain underlying architecture of the blockchain. The blockchain network architecture based on the DAG directed acyclic graph structure is a multi-chain structure, which can be regarded as a horizontal expansion of the traditional single-chain structure. Each node or account maintains a chain to record local information. A parachain-based DAG is constructed by cross-referencing. Each basic unit in the ledger can reference one or more predecessor units, and can be referenced by multiple successor units at the same time, which enables multiple nodes to add transactions or block units to the ledger at the same time, thus greatly improving the system throughput . Since this structure is similar to the traditional single-chain blockchain structure, it has good support for smart contracts. In the present invention, each single chain is managed and maintained by a peer-to-peer base station, and it is assumed in the present invention that the base station is credible. The nodes on the chain conduct consensus through the PBFT consensus mechanism. Each peer-to-peer single chain acts as a node cluster, and the chain is composed of verification nodes and ordinary nodes. The verification nodes between clusters, that is, between chains, regularly exchange data according to preset timestamps, so as to achieve the purpose of information interconnection in the entire IoT blockchain network. Figure 1 is a schematic diagram of the blockchain structure based on the DAG directed acyclic graph.
物联网节点通过数据采集程序将工作时所产生的数据通过智能合约自动上传至区块链,达到数据安全不可篡改,可追溯的目的。物联网节点所采集的数据可以包括节点ID、时间、地点、事件、传输时延、数据分组转发量、数据分组重复率等等,具体由物联网设备节点所工作的环境而定。比如节点为环境传感器所采集到的数据可能包括温度、湿度、压力值等等。若物联网节点所收集到的数据包含温度、湿度、压力值等等,需要事先在智能合约中写入正常数值波动范围、阈值范围,以进行比较来判定节点是否出现异常或出现不可信行为,以此判定节点可信度。The IoT node automatically uploads the data generated during work to the blockchain through the data collection program through the smart contract, so as to achieve the purpose of data security, non-tampering and traceability. The data collected by the IoT node may include node ID, time, location, event, transmission delay, data packet forwarding volume, data packet repetition rate, etc., depending on the working environment of the IoT device node. For example, the data collected by the node for environmental sensors may include temperature, humidity, pressure values, and so on. If the data collected by the IoT node includes temperature, humidity, pressure value, etc., it is necessary to write the normal value fluctuation range and threshold range in the smart contract in advance to compare to determine whether the node has abnormal or untrustworthy behavior. Based on this, the reliability of the node is determined.
每条链上的物联网节点分为验证节点和普通节点两类。验证节点根据事先在链上所布置的智能合约根据每个物联网节点提交的数据计算,并生成每个节点的综合信誉值。综合信誉值由直接信誉值Ta,推荐信誉值Tf和历史信誉值Th进行加权计算得出,采用加权系数Q1、Q2、Q3,综合信誉值T可表示为T=Q1×Ta+Q2×Tf+Q3×Th,其中0<Q1≤Q2≤Q3<1,Q1+Q2+Q3=1。直接信誉值的评定标准由节点与节点之间通过交互事件触发和周期性相结合的方式产生的传输时延、数据分组转发量、数据分组重复率等指标组成。通过智能合约控制节点设备将收集到的数据与事先预设的正常数值范围进行比较,通过机器学习算法生成直接信誉值。由多个节点基于神经网络推送产生推荐信誉值。历史信誉值由长期统计生成,信任评估队列长度一定并按时更新,历史信誉值的加入使最后得出的综合结果更具客观性及稳定性。综合信誉值产生流程如图2所示。在产生推荐信任值时,为避免恶意节点发送虚假、冲突的推荐信任值有意抬高或贬低某个节点的推荐信任值,故将各信誉值与平均信誉值的距离作为权值,将与期望值越远的权重降的越低,尽可能排除恶意诽谤的可能性。首先计算全部推荐信誉值的平均值然后计算信誉值与平均值的距离,进而判断推荐信誉值权重,第K个推荐信誉值mk的权重ck可表示为所有推荐信誉值加权计算最终得到合并信誉值 The IoT nodes on each chain are divided into two categories: verification nodes and ordinary nodes. The verification node calculates according to the data submitted by each IoT node according to the smart contract arranged on the chain in advance, and generates the comprehensive reputation value of each node. The comprehensive reputation value is calculated by weighting the direct reputation value T a , the recommended reputation value T f and the historical reputation value Th , and using the weighting coefficients Q 1 , Q 2 , Q 3 , the comprehensive reputation value T can be expressed as T=Q 1 ×T a +Q 2 ×T f +Q 3 ×T h , where 0<Q 1 ≤Q 2 ≤Q 3 <1, and Q 1 +Q 2 +Q 3 =1. The evaluation standard of direct reputation value is composed of indicators such as transmission delay, data packet forwarding volume, and data packet repetition rate generated by the combination of interaction event triggering and periodicity between nodes. The node device is controlled by a smart contract to compare the collected data with a preset normal value range, and generate a direct reputation value through a machine learning algorithm. The recommendation reputation value is generated by multiple nodes based on neural network push. The historical reputation value is generated by long-term statistics. The length of the trust evaluation queue is fixed and updated on time. The addition of the historical reputation value makes the final comprehensive result more objective and stable. The comprehensive reputation value generation process is shown in Figure 2. When generating the recommendation trust value, in order to avoid malicious nodes sending false and conflicting recommendation trust values to intentionally raise or degrade the recommendation trust value of a node, the distance between each reputation value and the average reputation value is used as the weight, and the distance between each reputation value and the average reputation value is used as the weight, and the expected value The farther the weight is, the lower the weight is, and the possibility of malicious slander is excluded as much as possible. First calculate the average of all recommended reputation values Then calculate the distance between the reputation value and the average value, and then judge the weight of the recommended reputation value. The weight ck of the Kth recommended reputation value m k can be expressed as The weighted calculation of all recommended reputation values finally obtains the combined reputation value
在普通节点信誉评估中,验证节点通过以往该节点的历史行为来评价此节点的综合信誉值,生成行为判定报告,基于PBFT进行本簇内共识,将不可信行为进行记录并做出相应惩罚,并且同时管理本簇内的所有节点。验证节点层通过基站来管理,本发明内假定基站可信。基站利用人工智能技术通过节点历史行为评价其信誉值,并选择高信誉值节点作为验证节点,并每隔一段时间进行信誉值更新,发现节点信誉值低于门限值,即撤销其验证节点,重新选择高信誉值节点作为验证节点。验证节点同时计算本簇群的信誉值作为整个簇群的参考,当簇群信誉值低于门限值时,将整个簇群从网络中去除,部署新的节点。这一切由已经部署在物联网区块链上的智能合约自动执行。In the common node reputation evaluation, the verification node evaluates the comprehensive reputation value of the node through the past historical behavior of the node, generates a behavior judgment report, conducts consensus within the cluster based on PBFT, records the untrustworthy behavior and makes corresponding penalties. And manage all nodes in the cluster at the same time. The verification node layer is managed by the base station, which is assumed to be credible in the present invention. The base station uses artificial intelligence technology to evaluate its reputation value through the historical behavior of nodes, and selects nodes with high reputation value as verification nodes, and updates the reputation value at regular intervals. Re-select the high reputation value node as the verification node. The verification node also calculates the reputation value of the cluster as a reference for the entire cluster. When the reputation value of the cluster is lower than the threshold value, the entire cluster is removed from the network and a new node is deployed. This is all performed automatically by smart contracts already deployed on the IoT blockchain.
本发明提出的基于区块链的IOT设备行为可信监管方法,通过部署的访问控制功能模块,对许可用户的数据操作进行记录,保证相关数据操作具有可追溯性。The blockchain-based trusted monitoring method for IOT device behavior proposed by the present invention records the data operations of licensed users through the deployed access control function module, so as to ensure the traceability of relevant data operations.
验证节点利用大数据技术定期将已确认处理的不可信信息进行汇总,并生成可视化报表,方便管理人员对整个物联网网络安全情况进行审查监管。The verification node uses big data technology to regularly summarize the untrusted information that has been confirmed and processed, and generate a visual report, which is convenient for managers to review and supervise the security of the entire Internet of Things network.
由以上本发明的内容可知,本发明与现有物联网网络方案相比,具有以下优势和有益的效果:As can be seen from the above content of the present invention, the present invention has the following advantages and beneficial effects compared with the existing Internet of Things network solution:
1.利用区块链技术,可以使用加密技术和安全算法来保护数字身份,从而构建物联网环境下更加安全便捷的数字身份认证系统。数字身份在上链之前需要通过认证机构(例如:政府、企业等)的认证与信用背书,上链之后,基于区块链的数字身份认证系统保障数字身份信息的真实性,并提供可信的认证服务。物联网中每个设备都有自己的区块链地址,可以根据特定的地址进行注册,从而保护其数字身份不受其他设备的影响。1. Using blockchain technology, encryption technology and security algorithms can be used to protect digital identities, so as to build a more secure and convenient digital identity authentication system in the Internet of Things environment. Before the digital identity is put on the chain, it needs to pass the certification and credit endorsement of the certification body (such as the government, enterprises, etc.). After the chain is put on the chain, the digital identity authentication system based on the blockchain guarantees the authenticity of the digital identity information and provides credible information. Certification Services. Each device in the IoT has its own blockchain address, which can be registered against a specific address, thus protecting its digital identity from other devices.
2.使用区块链技术构建物联网应用平台,可“去中心化”地将各类物联网相关的设备、网关、服务等有效连接融合,促进其相互协作,有效避免由单一节点失败而导致整个网络崩溃问题。打通物理与虚拟世界,降低成本的同时,极大限度的满足信任建立、交易加速、海量连接等需求。2. The use of blockchain technology to build an IoT application platform can "decentralize" the effective connection and integration of various IoT-related devices, gateways, services, etc., promote their mutual cooperation, and effectively avoid the failure of a single node. The whole network crashes problem. Open up the physical and virtual worlds, reduce costs, and meet the needs of trust establishment, transaction acceleration, and massive connections to the greatest extent possible.
3.区块链中分布式账本具有防篡改特性,能有效降低物联网网络中任何单一节点设备被恶意攻击和控制后带来的信息泄露和恶意操控风险。利用区块链技术组建和管理物联网网络,能及时掌控网络中各种生产制造设备的状态以及参与分工协作的各相关方的状态,提高设备的利用率和维护效率,从而能提供更加精准、高效的供应链服务。3. The distributed ledger in the blockchain has the characteristics of anti-tampering, which can effectively reduce the risk of information leakage and malicious manipulation caused by any single node device in the IoT network being maliciously attacked and controlled. The use of blockchain technology to build and manage the Internet of Things network can timely control the status of various manufacturing equipment in the network and the status of all parties involved in the division of labor and collaboration, improve equipment utilization and maintenance efficiency, and provide more accurate, Efficient supply chain services.
4.区块链可为物联网提供信任机制,保证所有权、交易等记录的可信性、可靠性及透明性,同时,还可为用户隐私提供保障机制,从而有效解决物联网发展面临的大数据管理、信任、安全和隐私等问题,推进物联网向更加灵活化、智能化的高级形态演进。4. The blockchain can provide a trust mechanism for the Internet of Things to ensure the credibility, reliability and transparency of records such as ownership and transactions. At the same time, it can also provide a protection mechanism for user privacy, so as to effectively solve the problems faced by the development of the Internet of Things. Issues such as data management, trust, security, and privacy promote the evolution of the Internet of Things to a more flexible and intelligent advanced form.
5.当物联网业务以智能合约的方式部署在物联网区块链上时,物联网设备可以在物联网区块链上通过查寻和执行相关智能合约来访问对应的物联网业务。当物联网业务部署在物联网区块链外部时,物联网设备可以通过物联网区块链查寻和执行相关辅助性智能合约以获得访问物联网业务的访问许可,然后与对应的物联网业务直接交互;同时,根据物联网业务的需求,物联网业务和物联网设备可以把双方交互的结果数据存储在物联网区块链上。5. When the IoT business is deployed on the IoT blockchain in the form of smart contracts, IoT devices can access the corresponding IoT business by searching and executing relevant smart contracts on the IoT blockchain. When the IoT business is deployed outside the IoT blockchain, the IoT device can search and execute related auxiliary smart contracts through the IoT blockchain to obtain the access permission to access the IoT business, and then directly communicate with the corresponding IoT business. At the same time, according to the needs of the IoT business, the IoT business and the IoT device can store the result data of the interaction between the two parties on the IoT blockchain.
附图说明Description of drawings
图1为基于DAG有向无环图的区块链结构示意图;Figure 1 is a schematic diagram of the blockchain structure based on the DAG directed acyclic graph;
图2为综合信誉值产生流程示意图;Figure 2 is a schematic diagram of the generation process of the comprehensive reputation value;
图3为IOT设备节点部署示意图。Figure 3 is a schematic diagram of IOT device node deployment.
具体实施方式Detailed ways
下面以公司智慧办公所用到的智能IOT设备为例,说明本发明实现过程。假设该方案包括智能门锁、智能开关、智能插座、智能灯光、智能音箱、智能空调、智能热水器、智能冰箱、智能环境传感器、智能扫地机器人、智能网关、智能安防报警器、摄像头等等IOT设备,这些设备所采用的通信协议往往非常简单,极容易被入侵。The implementation process of the present invention is described below by taking the intelligent IOT device used in the company's intelligent office as an example. Suppose the solution includes smart door locks, smart switches, smart sockets, smart lights, smart speakers, smart air conditioners, smart water heaters, smart refrigerators, smart environmental sensors, smart sweeping robots, smart gateways, smart security alarms, cameras, etc. IOT devices , the communication protocols used by these devices are often very simple and easily hacked.
在本方案实施时,以公司内部部门分类为标准进行划分,将公司拆分为多个部分,由每个部门内自行设立一台服务器,建立并维护一个区块链网络,由各部门所各自维护的区块链共同组成基于DAG有向无环图结构的区块链架构,覆盖整个公司IOT智能设备网络,基于DAG有向无环图的区块链结构如图1所示。部门内通过区块链技术,基于密码学及签名机制对本部门内所使用的智能IOT设备进行安全认证;通过智能合约的形式,规定智能IOT设备访问及其他行为权限;通过为每个IOT设备设立统一的数字身份ID标识,使设备间能互相识别验证,达到互联互通的目的。IOT设备部署示意图如图3所示。下面以链上节点之一摄像头设备为例,讲述本发明专利的部署及实施流程。During the implementation of this plan, the company's internal department classification is used as the standard to divide the company into multiple parts. Each department will set up a server on its own to establish and maintain a blockchain network. The maintained blockchains together form a blockchain architecture based on the DAG directed acyclic graph structure, covering the entire company's IOT smart device network. The blockchain structure based on the DAG directed acyclic graph is shown in Figure 1. The department uses blockchain technology to conduct security authentication for the smart IOT devices used in the department based on cryptography and signature mechanism; through the form of smart contracts, the access and other behavior permissions of smart IOT devices are stipulated; The unified digital ID identification enables devices to identify and verify each other, and achieve the purpose of interconnection. The schematic diagram of IOT equipment deployment is shown in Figure 3. The following describes the deployment and implementation process of the patent of the present invention by taking a camera device of one of the nodes on the chain as an example.
(1)部门服务器将摄像头设备上链,并为其生成一个基于区块链的身份ID以及一个加密私钥。生成后若用户需要获取摄像头设备管理权限必须进行登录,登录必须输入私钥,若私钥丢失任何人都将失去对数据的访问权限,此时需要联系部门管理人员解决。任何有关该摄像头设备的操作行为都将被上链记录且不可篡改。(1) The department server puts the camera device on the chain, and generates a blockchain-based identity ID and an encrypted private key for it. After generation, if the user needs to obtain the management authority of the camera device, he must log in, and the private key must be entered to log in. If the private key is lost, anyone will lose the access authority to the data. Any operation of the camera device will be recorded on the chain and cannot be tampered with.
(2)链上节点分为验证节点与普通节点,假定该摄像头设备节点为普通节点。首先通过设备节点部署的数据采集程序将摄像头设备在工作时产生的传输时延、数据分组转发量、数据分组重复率信息收集并记录在区块链上,智能合约根据事先所设定的各类数据指标阈值进行对比计算,基于机器学习算法生成直接信誉值;由链上相邻设备节点基于神经网络算法互相推送产生推荐信誉值;本节点长期将每次生成的信誉值记录在区块链上形成历史信誉值队列。三种信誉值由验证节点根据链上智能合约进行加权计算,生成综合信誉值,具体产生流程由图2所示。(2) The nodes on the chain are divided into verification nodes and ordinary nodes. It is assumed that the camera device node is an ordinary node. First, through the data acquisition program deployed by the device node, the transmission delay, data packet forwarding volume, and data packet repetition rate information generated by the camera equipment during operation are collected and recorded on the blockchain. The data indicator thresholds are compared and calculated, and the direct reputation value is generated based on the machine learning algorithm; the recommended reputation value is generated by the adjacent device nodes on the chain based on the neural network algorithm; the node records the generated reputation value each time on the blockchain for a long time. Form a queue of historical reputation values. The three types of reputation values are weighted and calculated by the verification node according to the smart contract on the chain to generate a comprehensive reputation value. The specific generation process is shown in Figure 2.
(3)综合信誉值作为评判该摄像头设备节点是否具有不可信行为的标准,在生成后基于PBFT进行全网共识并记录在区块链上,由验证节点基于智能合约,根据所生成的综合信誉值高低,利用人工智能技术对该节点是否具有不可信行为进行判断。(3) The comprehensive reputation value is used as the criterion for judging whether the camera device node has untrustworthy behavior. After generation, the whole network consensus is carried out based on PBFT and recorded on the blockchain. The verification node is based on the smart contract, according to the generated comprehensive reputation The value is high or low, and artificial intelligence technology is used to judge whether the node has untrustworthy behavior.
(4)若最终得出综合信誉值高于预先所设定的信誉值阈值,则判定该摄像头设备节点没有异常,即没有产生不可信行为,此时对该摄像头设备节点的历史信誉值评估队列进行更新,保持队列长度不变;若最终得出综合信誉值低于预先所设定的信誉值阈值,在次数不超过10次的情况下利用机器学习算法做不同程度的降低历史信誉分的处理,超过10次则直接将该设备节点下线,进行维修或做直接抛弃处理,处理完成后根据具体情况考虑是否对设备进行二次上链使用。具体次数可按照具体情况进行改变。(4) If it is finally concluded that the comprehensive reputation value is higher than the preset reputation value threshold, it is determined that the camera device node is not abnormal, that is, no untrustworthy behavior occurs, and the historical reputation value evaluation queue of the camera device node is at this time. Update and keep the queue length unchanged; if the final comprehensive reputation value is lower than the pre-set reputation value threshold, the machine learning algorithm is used to reduce the historical reputation score to different degrees under the condition that the number of times does not exceed 10 times. , if it exceeds 10 times, the device node will be directly offline for maintenance or direct disposal. After the processing is completed, it will be considered whether to use the device on the chain for a second time according to the specific situation. The specific number of times can be changed according to the specific situation.
(5)部门服务器统一管理验证节点层。服务器利用人工智能技术选择高信誉值节点作为验证节点,并每隔一段时间进行信誉值更新,发现节点信誉值低于门限值,即撤销其验证节点,重新选择高信誉值节点作为验证节点。(5) The department server manages the verification node layer uniformly. The server uses artificial intelligence technology to select nodes with high reputation value as verification nodes, and updates the reputation value at regular intervals. If the reputation value of the node is found to be lower than the threshold value, it revokes its verification node, and re-selects the high reputation value node as the verification node.
(6)验证节点通过大数据技术定期将已确认处理的不可信信息进行汇总,并生成可视化报表,方便管理人员对整个物联网网络安全情况进行审查监管。(6) The verification node regularly summarizes the untrusted information that has been confirmed and processed through big data technology, and generates a visual report, which is convenient for managers to review and supervise the security of the entire Internet of Things network.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110365300.XA CN113115315B (en) | 2021-04-02 | 2021-04-02 | IOT equipment behavior credible supervision method based on block chain |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110365300.XA CN113115315B (en) | 2021-04-02 | 2021-04-02 | IOT equipment behavior credible supervision method based on block chain |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN113115315A CN113115315A (en) | 2021-07-13 |
| CN113115315B true CN113115315B (en) | 2022-10-04 |
Family
ID=76713933
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110365300.XA Active CN113115315B (en) | 2021-04-02 | 2021-04-02 | IOT equipment behavior credible supervision method based on block chain |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113115315B (en) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113839945B (en) * | 2021-09-23 | 2023-05-19 | 北京交通大学 | An identity-based trusted access control system and method |
| CN113949642B (en) * | 2021-10-19 | 2025-05-23 | 中国电子科技集团公司第二十研究所 | Block chain storage-based trust evaluation method for sensor nodes of Internet of things |
| CN114389902B (en) * | 2022-03-24 | 2022-06-10 | 北京中科金财科技股份有限公司 | Block chain-based network security monitoring method and system |
| CN114756561B (en) * | 2022-04-26 | 2025-08-12 | 蚂蚁区块链科技(上海)有限公司 | Transaction execution method and device and electronic equipment |
| CN116846674B (en) * | 2023-05-16 | 2025-03-18 | 北京邮电大学 | A high-throughput distributed ledger system based on DAG |
| CN116582853B (en) * | 2023-06-02 | 2025-08-22 | 电子科技大学 | A trusted data collection method based on lightweight blockchain for the Internet of Things |
| CN116827488B (en) * | 2023-08-30 | 2024-01-05 | 广东电网有限责任公司东莞供电局 | Power data transmission control method and device based on block chain and storage medium |
| CN117951140A (en) * | 2024-03-25 | 2024-04-30 | 成都秦川物联网科技股份有限公司 | Industrial Internet of things sub-service platform data interaction system |
| CN118552215A (en) * | 2024-07-24 | 2024-08-27 | 广州锐嘉工业股份有限公司 | A blockchain-based drug packaging production traceability management system |
| CN119544203A (en) * | 2024-11-08 | 2025-02-28 | 中移物联网有限公司 | A method, device, equipment, medium and product for registering information of Internet of Vehicles card |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110995448A (en) * | 2019-12-19 | 2020-04-10 | 杭州羿贝科技有限公司 | Block chain-based Internet of things equipment identity authentication method and system |
| CN111949672A (en) * | 2020-07-30 | 2020-11-17 | 杭州电子科技大学 | A blockchain storage method that supports incremental update of IoT data |
Family Cites Families (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3596880B1 (en) * | 2017-04-18 | 2022-06-01 | Samsung Electronics Co., Ltd. | Method and apparatus for access control in distributed blockchain-based internet of things (iot) network |
| CN109544334B (en) * | 2018-10-22 | 2020-09-29 | 深圳市哈希树科技有限公司 | Method for realizing network extensible block chain |
| EP3673620B8 (en) * | 2019-07-11 | 2022-02-16 | Advanced New Technologies Co., Ltd. | Shared blockchain data storage |
| CN110784346B (en) * | 2019-10-18 | 2022-07-29 | 深圳供电局有限公司 | Reputation value-based PBFT consensus system and method |
| CN111080288B (en) * | 2019-10-18 | 2023-08-18 | 湖南天河国云科技有限公司 | Block chain consensus achieving method and device based on directed acyclic graph |
| CN111181946B (en) * | 2019-12-24 | 2021-05-18 | 浙江大学 | A trusted traceability system and method based on blockchain and the Internet of Things |
| CN111246474B (en) * | 2020-01-10 | 2022-08-23 | 中国联合网络通信集团有限公司 | Base station authentication method and device |
| CN111355780B (en) * | 2020-02-18 | 2022-09-13 | 杭州云象网络技术有限公司 | Internet of things monitoring management method and system based on block chain |
| CN111510502A (en) * | 2020-04-28 | 2020-08-07 | 吉林科创电力有限公司 | PBFT consensus propagation optimization method based on dynamic reputation value |
| CN112417494B (en) * | 2020-10-26 | 2024-12-10 | 国网浙江省电力有限公司电力科学研究院 | Power blockchain system based on trusted computing |
| CN112511315A (en) * | 2020-12-03 | 2021-03-16 | 重庆邮电大学 | Industrial Internet of things authentication method based on DAG block chain |
-
2021
- 2021-04-02 CN CN202110365300.XA patent/CN113115315B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110995448A (en) * | 2019-12-19 | 2020-04-10 | 杭州羿贝科技有限公司 | Block chain-based Internet of things equipment identity authentication method and system |
| CN111949672A (en) * | 2020-07-30 | 2020-11-17 | 杭州电子科技大学 | A blockchain storage method that supports incremental update of IoT data |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113115315A (en) | 2021-07-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN113115315B (en) | IOT equipment behavior credible supervision method based on block chain | |
| Da Xu et al. | Embedding blockchain technology into IoT for security: A survey | |
| Sharma et al. | Distblocknet: A distributed blockchains-based secure sdn architecture for iot networks | |
| Wang et al. | Blockchain-based data storage mechanism for industrial internet of things | |
| Alcaraz et al. | Security aspects of SCADA and DCS environments | |
| Tukur et al. | Edge‐based blockchain enabled anomaly detection for insider attack prevention in Internet of Things | |
| CN112073431B (en) | Security defense method and system for industrial control system network | |
| CN117040896A (en) | Internet of things management method and Internet of things management platform | |
| Sarjan et al. | Cyber-security of industrial internet of things in electric power systems | |
| De Benedictis et al. | Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security | |
| CN111444262A (en) | Electric power data sharing system based on block chain | |
| CN119030681A (en) | Blockchain intelligent decision-making system based on arbitration mechanism | |
| CN117354317A (en) | Audit-based cross-chain bridge management system | |
| Adebayo et al. | Blockchain Technology: A Panacea for IoT Security Challenge. | |
| CN118349979A (en) | A user information security processing control system for smart medical care | |
| Singh | Cybersecurity for Smart Cities Protecting Infrastructure in the Era of Digitalization | |
| CN120263387A (en) | Cross-domain collaborative analysis method of trusted data space based on privacy computing | |
| Xu et al. | Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment | |
| Alshammari | Securing smart microgrids with a novel multi-layer cybersecurity framework for Industry 4.0 renewable energy systems | |
| CN119599679A (en) | Block chain-based intelligent protection method and system for financial transaction data | |
| Yu et al. | EviChain: A scalable blockchain for accountable intelligent surveillance systems | |
| Bourian et al. | SSHCEth: Secure smart home communications based on ethereum blockchain and smart contract | |
| Zhang et al. | A dynamic security control architecture for industrial cyber-physical system | |
| US20230138200A1 (en) | Security management method and system for blended environment | |
| CN114710796A (en) | Sensor abnormity detection method, device and system based on block chain |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |