CN104767749B - A kind of information processing method based on wireless Internet of Things - Google Patents

A kind of information processing method based on wireless Internet of Things Download PDF

Info

Publication number
CN104767749B
CN104767749B CN201510151750.3A CN201510151750A CN104767749B CN 104767749 B CN104767749 B CN 104767749B CN 201510151750 A CN201510151750 A CN 201510151750A CN 104767749 B CN104767749 B CN 104767749B
Authority
CN
China
Prior art keywords
wireless
wireless terminals
data message
access path
forwarding server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510151750.3A
Other languages
Chinese (zh)
Other versions
CN104767749A (en
Inventor
李闻白
林飞龙
李虎雄
鲁剑锋
潘竹生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinhua Lingxi Intelligent Technology Co ltd
Zhejiang Shanghua Electronic Technology Co ltd
Original Assignee
Zhejiang Normal University CJNU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Normal University CJNU filed Critical Zhejiang Normal University CJNU
Priority to CN201510151750.3A priority Critical patent/CN104767749B/en
Publication of CN104767749A publication Critical patent/CN104767749A/en
Application granted granted Critical
Publication of CN104767749B publication Critical patent/CN104767749B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of information processing method based on wireless Internet of Things, and the wireless Internet of Things includes multiple wireless sensor nodes, a resource information forwarding server and multiple P2P wireless terminals.Each wireless sensor node gathers article or the data message of service in the wireless Internet of Things, and the data message of collection is sent into resource information forwarding server;The resource information forwarding server data message received from the wireless sensor node is identified processing and security is filtered, and the data message is forwarded into a P2P wireless terminal;Each P2P wireless terminal receptions simultaneously store the data message that the resource information forwarding server is forwarded;The P2P wireless terminals can read the data message stored in other P2P wireless terminals.

Description

A kind of information processing method based on wireless Internet of Things
Technical field
The present invention relates to internet of things field, more particularly to a kind of information processing method based on wireless Internet of Things.
Background technology
Internet of Things is the extension and extension of internet, and the network is that " all things on earth " connect into one is controllable, safe in this world Information network, can be applied to all trades and professions.Usually, Internet of Things is more understood to the equipment tissue networking of all trades and professions Network, i.e. end Network, these end Networks are connected to internet by appropriate mode again, realize in network any time, appoint Where put between people and thing, the communication between thing and thing, realize acquisition of information, equipment control etc..
The end Network of wireless Internet of Things is different with traditional the Internet architecture.It is provided with traditional internet substantial amounts of Communicated between gateway and router, network node by gateway and router.In the end wireless network of wireless Internet of Things In, wireless network node equipment may all very littles, pass through wireless connection, the work(of wireless node apparatus between wireless network node Rate, disposal ability are all very limited, network size dynamic change.In addition, under many applicable cases, in the wireless network of end, Reliability, accuracy and the security requirement that radio node communicates are very high, and validity, real-time to data transfer etc. is required Can suitably it relax.
So far, not yet there is a kind of information processing method for more efficiently, being accurately directed to wireless Internet of Things.
The content of the invention
The present invention is aiming at the weak point in above-mentioned background technology, and a kind of letter based on wireless Internet of Things proposed Processing method is ceased, it has higher security and efficiency.The purpose of the present invention is achieved by the following technical measures.
A kind of information processing method based on wireless Internet of Things, the wireless Internet of Things includes multiple wireless sensor nodes Point, a resource information forwarding server and multiple P2P wireless terminals, it is characterised in that:
Each wireless sensor node gathers article or the data message of service in the wireless Internet of Things, and by collection Data message is sent to resource information forwarding server;
From the data message received from the wireless sensor node is identified the resource information forwarding server Reason and security filtering, and the data message is forwarded to a P2P wireless terminal;
Each P2P wireless terminal receptions simultaneously store the data message that the resource information forwarding server is forwarded;Also, The P2P wireless terminals can read the data message stored in other P2P wireless terminals.
Further, the data message gathered is sent into the resource information in each wireless sensor node to forward Before server, in addition it is also necessary to carry out authentication between the wireless sensor node and the resource information forwarding server; Assuming that the computer or the entitled R1 of other computing terminals that are directly connected to the wireless sensor node, the resource information turn The entitled R2 of server is sent out, then authentication process itself is as follows:
Step U1, R2 one random number Q of generation, sends it to R1;
Step U2, R1 are received after the random number Q of R2 generations, one private key Ks of generation and two public keys Ka and Kb;
Wherein, (Ka)2+(Kb)2=Q2
Then, public key Ka and Kb are returned to R2 by R1;
Step U3, R2 are verified after receiving public key Ka and Kb to it;
If (Ka)2+(Kb)2≠Q2, then authentication failure, termination communication;
Otherwise, Q is encrypted using public key Ka and Kb respectively, encryption data E (Ka) and E (Kb) is sent to R1;
Step U4, R1 are decrypted using private key Ks to the encryption data E (Ka) and E (Kb) that receive, if decrypted result is all Q, then authentication passes through, and shows that normal data transfer can be carried out between R1 and R2;Otherwise, authentication fails, and terminates Communication.
Further, authentication is completed between the wireless sensor node and the resource information forwarding server Afterwards, the data message of collection is sent to the resource information forwarding in the following manner and serviced by the wireless sensor node Device, specifically:
For the wireless sensor node:
The wireless sensor node is held before the data message of collection is sent into the resource information forwarding server Row is following to be operated:
Step M1, three sections, respectively subdata information info1, subdata information are divided into by the data message Info2 and subdata information info3, the length of above-mentioned three cross-talks data message is respectively k1 bytes, k2 bytes, k3 bytes; Above-mentioned three cross-talks data message is arranged into engagement in order can obtain the data message;
Wherein, k2>K1+k3, and k3>k1;
Step M2, engagement is arranged by subdata information info1 and subdata information info3 in order, obtains verification data Information;
Step M3, calculates the MD5 values of the verification data information, obtains referential integrity check value H1;
Step M4, the data message and control information are sent to the resource information forwarding server jointly;
Wherein, the control information includes referential integrity check value H1 and k1 and k3 value;
For the resource information forwarding server:
The resource information forwarding server receives data message and control information from the wireless sensor node Afterwards, following operate is performed:
Step N1, extracts the starting k1 bytes and last position k3 bytes of the data message, arrangement engagement, is treated in order Check information;
Step N2, calculates the MD5 values of the information to be verified, obtains actual integrity check value H2;
Step N3 is complete by the reference in the control information for calculating the actual integrity check value H2 and reception obtained Property check value H1 is compared;If both are identical, the data message passes through completeness check;Otherwise, the number is abandoned It is believed that breath, and send transmission instruction again to the wireless sensor node.
Further, each P2P wireless terminals itself have an adjacent access information list, for by directly The P2P wireless terminals of connection access other P2P wireless terminals;
The adjacent access information list includes herein below:
(1) address for the P2P wireless terminals being directly connected to current P2P wireless terminals;
(2) network bandwidth between current P2P wireless terminals and directly connected P2P wireless terminals;
(3) the average connection setup time between current P2P wireless terminals and directly connected P2P wireless terminals;
(4) the successful connection probability between current P2P wireless terminals and directly connected P2P wireless terminals;
(5) data transfer integrity between current P2P wireless terminals and directly connected P2P wireless terminals is general Rate;
Originated when one P2P wireless terminals b1 need to access in network one it is wireless with the target P2P of its indirect connection During terminal bn, following operate is performed:
Step A1, is the starting P2P wireless terminals b1 by current P2P wireless terminals Initialize installation;
Step A2, inquires about all P2P directly connected in current P2P wireless terminals b1 adjoining access information list Wireless terminal;
If it find that the target P2P wireless terminal bn, then return;
Otherwise, successively by current P2P wireless terminals be set to the starting P2P wireless terminals b1 be directly connected to it is each Individual P2P wireless terminals;Correspondingly, pair each current P2P wireless terminal being directly connected to the starting P2P wireless terminals b1 Perform step A3;
Step A3, the adjacent of P2P wireless terminals being directly connected to current P2P wireless terminals is inquired about using recursive algorithm and is visited Information list is asked, if it find that the target P2P wireless terminal bn, then recurrence return.
Further, if there is k bar access path between starting P2P wireless terminals b1 and target P2P wireless terminals bn L1, L2 ..., Lk, wherein, k is greater than 1 positive integer, then the step of selecting optimal access path is as follows:
Step B1, calculates in access path L1, L2 ..., Lk the total of the network bandwidth between each two P2P wireless terminals respectively And W ' 1, W ' 2 ..., W ' k;
According to the connection number in every access path L1, L2 ..., Lk, the averaging network bandwidth of every access path is calculated W1, W2 ..., Wk;
Wherein, the P2P wireless terminal quantity that the connection number in an access path is defined as in the access path subtracts 1;
Step B2, calculates average connection foundation between each two P2P wireless terminals in access path L1, L2 ..., Lk respectively The summation T ' 1, T ' 2 ... of time, T ' k;
According to the connection number in every access path L1, L2 ..., Lk, when the total connection for calculating every access path is set up Between T1, T2 ..., Tk;
Step B3, respectively by access path L1, L2 ..., the successful connection probability in Lk between each two P2P wireless terminals It is multiplied, obtain every access path connects into power C1, C2 ..., Ck;
Step B4, respectively by access path L1, L2 ..., the data transfer in Lk between each two P2P wireless terminals is complete Property probability multiplication, obtains the data transfer percentage of head rice I1 of every access path, I2 ..., Ik;
Step B5, according to the data obtained in above-mentioned steps, calculates access path L1, L2 ..., Lk overall merit respectively Parameter Ф 1, Ф 2 ..., Ф k, the maximum access path of selection assessment parameter value are used as optimal access path;Specifically, visit Ask the way footpath Li assessment parameter Ф i calculation formula it is as follows:
Ф i=lg (Wi+1)/lg (Ti+1) * (3Ci+2Ii)2
Wherein, i is positive integer, and 1≤i≤k.
Further, when it is determined that after the target P2P wireless terminal bn, in the starting P2P wireless terminals b1 and mesh Before carrying out data transmission between mark P2P wireless terminals bn, in addition to authentication process itself, it is specific as follows:
Step V1, bn one random number R of generation, sends it to b1;
Step V2, b1 are received after the random number R of bn generations, one private key Ks of generation and two public keys Kp1 and Kp2;
Wherein, (Kp1)2+(Kp2)2=R2
Then, public key Kp1 and Kp2 are returned to bn by b1;
Step V3, bn is verified after receiving public key Kp1 and Kp2 to it, if (Kp1)2+(Kp2)2≠R2, then identity test Card failure, terminates communication;Otherwise, R is encrypted using public key Kp1 and Kp2 respectively, by encryption data E (Kp1) and E (Kp2) It is sent to b1;
Step V4, b1 are decrypted using private key Ks to the encryption data E (Kp1) and E (Kp2) that receive, if decrypted result is all It is R, then authentication passes through, shows that normal data transfer can be carried out between b1 and bn;Otherwise, authentication fails, eventually Only communicate.
Compared with prior art, there is advantages below in technical scheme:
First, technical scheme has used the safe practice of identity-based checking and data integrity verifying, Substantially increase data acquisition end in wireless Internet of Things, between server end and P2P wireless terminals data transfer security And reliability;
Second, technical scheme is combined for the selection course of distributed routed path in wireless Internet of Things Various factors so that the Path selection in wireless Internet of Things is more reasonable.
Brief description of the drawings
Technical scheme is further detailed below in conjunction with the accompanying drawings.In the accompanying drawings, identical accompanying drawing is used Mark represents identical functional module.The accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to this The limitation of invention.
Fig. 1 shows system construction drawing according to an embodiment of the invention.
Embodiment
By the detailed description of hereafter preferred embodiment, various other advantages and benefit are for ordinary skill Personnel will be clear understanding.The description is only the general introduction of technical solution of the present invention, in order to better understand the present invention Technological means, and can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature It can be become apparent with advantage.
Fig. 1 is the system construction drawing according to the embodiment of the present invention.
Shown in reference picture 1, a kind of information processing method based on wireless Internet of Things, the wireless Internet of Things includes multiple Wireless sensor node, a resource information forwarding server and multiple P2P wireless terminals, it is characterised in that:
Each wireless sensor node gathers article or the data message of service in the wireless Internet of Things, and by collection Data message is sent to resource information forwarding server;
From the data message received from the wireless sensor node is identified the resource information forwarding server Reason and security filtering, and the data message is forwarded to a P2P wireless terminal;
Each P2P wireless terminal receptions simultaneously store the data message that the resource information forwarding server is forwarded;Also, The P2P wireless terminals can read the data message stored in other P2P wireless terminals.
Further, the data message gathered is sent into the resource information in each wireless sensor node to forward Before server, in addition it is also necessary to carry out authentication between the wireless sensor node and the resource information forwarding server; Assuming that the computer or the entitled R1 of other computing terminals that are directly connected to the wireless sensor node, the resource information turn The entitled R2 of server is sent out, then authentication process itself is as follows:
Step U1, R2 one random number Q of generation, sends it to R1;
Step U2, R1 are received after the random number Q of R2 generations, one private key Ks of generation and two public keys Ka and Kb;
Wherein, (Ka)2+(Kb)2=Q2
Then, public key Ka and Kb are returned to R2 by R1;
Step U3, R2 are verified after receiving public key Ka and Kb to it;
If (Ka)2+(Kb)2≠Q2, then authentication failure, termination communication;
Otherwise, Q is encrypted using public key Ka and Kb respectively, encryption data E (Ka) and E (Kb) is sent to R1;
Step U4, R1 are decrypted using private key Ks to the encryption data E (Ka) and E (Kb) that receive, if decrypted result is all Q, then authentication passes through, and shows that normal data transfer can be carried out between R1 and R2;Otherwise, authentication fails, and terminates Communication.
Further, authentication is completed between the wireless sensor node and the resource information forwarding server Afterwards, the data message of collection is sent to the resource information forwarding in the following manner and serviced by the wireless sensor node Device, specifically:
For the wireless sensor node:
The wireless sensor node is held before the data message of collection is sent into the resource information forwarding server Row is following to be operated:
Step M1, three sections, respectively subdata information info1, subdata information are divided into by the data message Info2 and subdata information info3, the length of above-mentioned three cross-talks data message is respectively k1 bytes, k2 bytes, k3 bytes; Above-mentioned three cross-talks data message is arranged into engagement in order can obtain the data message;
Wherein, k2>K1+k3, and k3>k1;
Step M2, engagement is arranged by subdata information info1 and subdata information info3 in order, obtains verification data Information;
Step M3, calculates the MD5 values of the verification data information, obtains referential integrity check value H1;
Step M4, the data message and control information are sent to the resource information forwarding server jointly;
Wherein, the control information includes referential integrity check value H1 and k1 and k3 value;
For the resource information forwarding server:
The resource information forwarding server receives data message and control information from the wireless sensor node Afterwards, following operate is performed:
Step N1, extracts the starting k1 bytes and last position k3 bytes of the data message, arrangement engagement, is treated in order Check information;
Step N2, calculates the MD5 values of the information to be verified, obtains actual integrity check value H2;
Step N3 is complete by the reference in the control information for calculating the actual integrity check value H2 and reception obtained Property check value H1 is compared;If both are identical, the data message passes through completeness check;Otherwise, the number is abandoned It is believed that breath, and send transmission instruction again to the wireless sensor node.
Further, each P2P wireless terminals itself have an adjacent access information list, for by directly The P2P wireless terminals of connection access other P2P wireless terminals;
The adjacent access information list includes herein below:
(1) address for the P2P wireless terminals being directly connected to current P2P wireless terminals;
(2) network bandwidth between current P2P wireless terminals and directly connected P2P wireless terminals;
(3) the average connection setup time between current P2P wireless terminals and directly connected P2P wireless terminals;
(4) the successful connection probability between current P2P wireless terminals and directly connected P2P wireless terminals;
(5) data transfer integrity between current P2P wireless terminals and directly connected P2P wireless terminals is general Rate;
Originated when one P2P wireless terminals b1 need to access in network one it is wireless with the target P2P of its indirect connection During terminal bn, following operate is performed:
Step A1, is the starting P2P wireless terminals b1 by current P2P wireless terminals Initialize installation;
Step A2, inquires about all P2P directly connected in current P2P wireless terminals b1 adjoining access information list Wireless terminal;
If it find that the target P2P wireless terminal bn, then return;
Otherwise, successively by current P2P wireless terminals be set to the starting P2P wireless terminals b1 be directly connected to it is each Individual P2P wireless terminals;Correspondingly, pair each current P2P wireless terminal being directly connected to the starting P2P wireless terminals b1 Perform step A3;
Step A3, the adjacent of P2P wireless terminals being directly connected to current P2P wireless terminals is inquired about using recursive algorithm and is visited Information list is asked, if it find that the target P2P wireless terminal bn, then recurrence return.
Further, if there is k bar access path between starting P2P wireless terminals b1 and target P2P wireless terminals bn L1, L2 ..., Lk, wherein, k is greater than 1 positive integer, then the step of selecting optimal access path is as follows:
Step B1, calculates in access path L1, L2 ..., Lk the total of the network bandwidth between each two P2P wireless terminals respectively And W ' 1, W ' 2 ..., W ' k;
According to the connection number in every access path L1, L2 ..., Lk, the averaging network bandwidth of every access path is calculated W1, W2 ..., Wk;
Wherein, the P2P wireless terminal quantity that the connection number in an access path is defined as in the access path subtracts 1;
Step B2, calculates average connection foundation between each two P2P wireless terminals in access path L1, L2 ..., Lk respectively The summation T ' 1, T ' 2 ... of time, T ' k;
According to the connection number in every access path L1, L2 ..., Lk, when the total connection for calculating every access path is set up Between T1, T2 ..., Tk;
Step B3, respectively by access path L1, L2 ..., the successful connection probability in Lk between each two P2P wireless terminals It is multiplied, obtain every access path connects into power C1, C2 ..., Ck;
Step B4, respectively by access path L1, L2 ..., the data transfer in Lk between each two P2P wireless terminals is complete Property probability multiplication, obtains the data transfer percentage of head rice I1 of every access path, I2 ..., Ik;
Step B5, according to the data obtained in above-mentioned steps, calculates access path L1, L2 ..., Lk overall merit respectively Parameter Ф 1, Ф 2 ..., Ф k, the maximum access path of selection assessment parameter value are used as optimal access path;Specifically, visit Ask the way footpath Li assessment parameter Ф i calculation formula it is as follows:
Ф i=lg (Wi+1)/lg (Ti+1) * (3Ci+2Ii)2
Wherein, i is positive integer, and 1≤i≤k.
Further, when it is determined that after the target P2P wireless terminal bn, in the starting P2P wireless terminals b1 and mesh Before carrying out data transmission between mark P2P wireless terminals bn, in addition to authentication process itself, it is specific as follows:
Step V1, bn one random number R of generation, sends it to b1;
Step V2, b1 are received after the random number R of bn generations, one private key Ks of generation and two public keys Kp1 and Kp2;
Wherein, (Kp1)2+(Kp2)2=R2
Then, public key Kp1 and Kp2 are returned to bn by b1;
Step V3, bn is verified after receiving public key Kp1 and Kp2 to it, if (Kp1)2+(Kp2)2≠R2, then identity test Card failure, terminates communication;Otherwise, R is encrypted using public key Kp1 and Kp2 respectively, by encryption data E (Kp1) and E (Kp2) It is sent to b1;
Step V4, b1 are decrypted using private key Ks to the encryption data E (Kp1) and E (Kp2) that receive, if decrypted result is all It is R, then authentication passes through, shows that normal data transfer can be carried out between b1 and bn;Otherwise, authentication fails, eventually Only communicate.
In summary, it is only the present invention preferably embodiment, but protection scope of the present invention is not limited thereto, Any one skilled in the art the invention discloses technical scope in, the change or replacement that can be readily occurred in, It should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with scope of the claims It is defined.

Claims (5)

1. a kind of information processing method based on wireless Internet of Things, the wireless Internet of Things includes multiple wireless sensor nodes Point, a resource information forwarding server and multiple P2P wireless terminals, it is characterised in that:
Each wireless sensor node gathers article or the data message of service in the wireless Internet of Things, and by the data of collection Information is sent to resource information forwarding server;
The resource information forwarding server to the data message received from the wireless sensor node be identified processing and Security is filtered, and the data message is forwarded into a P2P wireless terminal;
Each P2P wireless terminal receptions simultaneously store the data message that the resource information forwarding server is forwarded;Also, it is described P2P wireless terminals can read the data message stored in other P2P wireless terminals;
Before the data message gathered to be sent to each wireless sensor node the resource information forwarding server, also Need to carry out authentication between the wireless sensor node and the resource information forwarding server;Assuming that with this it is wireless pass Computer or the entitled R1 of other computing terminals that sensor node is directly connected to, the title of the resource information forwarding server For R2, then authentication process itself is as follows:
Step U1, R2 one random number Q of generation, sends it to R1;
Step U2, R1 are received after the random number Q of R2 generations, one private key Ks of generation and two public keys Ka and Kb;
Wherein, (Ka)2+(Kb)2=Q2
Then, public key Ka and Kb are returned to R2 by R1;
Step U3, R2 are verified after receiving public key Ka and Kb to it;
If (Ka)2+(Kb)2≠Q2, then authentication failure, termination communication;
Otherwise, Q is encrypted using public key Ka and Kb respectively, encryption data E (Ka) and E (Kb) is sent to R1;
Step U4, R1 are decrypted using private key Ks to the encryption data E (Ka) and E (Kb) that receive, if decrypted result is all Q, Authentication passes through, and shows that normal data transfer can be carried out between R1 and R2;Otherwise, authentication fails, and terminates communication.
2. according to the method described in claim 1, it is characterised in that:
It is described wireless between the wireless sensor node and the resource information forwarding server after completion authentication The data message of collection is sent to the resource information forwarding server by sensor node in the following manner, specifically:
For the wireless sensor node:
The wireless sensor node before the data message of collection is sent into the resource information forwarding server, perform with Lower operation:
Step M1, three sections are divided into by the data message, respectively subdata information info1, subdata information info2, with And subdata information info3, the length of above-mentioned three cross-talks data message is respectively k1 bytes, k2 bytes, k3 bytes;By above-mentioned three Cross-talk data message arranges engagement in order can obtain the data message;
Wherein, k2>K1+k3, and k3>k1;
Step M2, engagement is arranged by subdata information info1 and subdata information info3 in order, obtains verification data information;
Step M3, calculates the MD5 values of the verification data information, obtains referential integrity check value H1;
Step M4, the data message and control information are sent to the resource information forwarding server jointly;
Wherein, the control information includes referential integrity check value H1 and k1 and k3 value;
For the resource information forwarding server:
The resource information forwarding server is received after data message and control information from the wireless sensor node, is held Row is following to be operated:
Step N1, extracts the starting k1 bytes and last position k3 bytes of the data message, and arrangement engagement in order is obtained to be verified Information;
Step N2, calculates the MD5 values of the information to be verified, obtains actual integrity check value H2;
Step N3, by the referential integrity school in the control information for calculating the actual integrity check value H2 and reception obtained Value H1 is tested to be compared;If both are identical, the data message passes through completeness check;Otherwise, the data letter is abandoned Breath, and send transmission instruction again to the wireless sensor node.
3. method according to claim 2, it is characterised in that:
Each P2P wireless terminals itself have an adjacent access information list, wireless for the P2P by directly connecting Terminal accesses other P2P wireless terminals;
The adjacent access information list includes herein below:
(1) address for the P2P wireless terminals being directly connected to current P2P wireless terminals;
(2) network bandwidth between current P2P wireless terminals and directly connected P2P wireless terminals;
(3) the average connection setup time between current P2P wireless terminals and directly connected P2P wireless terminals;
(4) the successful connection probability between current P2P wireless terminals and directly connected P2P wireless terminals;
(5) the data transfer integrity probability between current P2P wireless terminals and directly connected P2P wireless terminals;
P2P wireless terminals b1 is originated when one needs to access in network one and the target P2P wireless terminals of its indirect connection During bn, following operate is performed:
Step A1, is the starting P2P wireless terminals b1 by current P2P wireless terminals Initialize installation;
Step A2, inquires about all P2P directly connected in current P2P wireless terminals b1 adjoining access information list wireless Terminal;
If it find that the target P2P wireless terminal bn, then return;
Otherwise, current P2P wireless terminals are set to each that be directly connected to the starting P2P wireless terminals b1 successively P2P wireless terminals;Correspondingly, pair held with the starting P2P wireless terminals b1 each current P2P wireless terminal being directly connected to Row step A3;
Step A3, the adjacent of P2P wireless terminals being directly connected to current P2P wireless terminals is inquired about using recursive algorithm and accesses letter List is ceased, if it find that the target P2P wireless terminal bn, then recurrence return.
4. method according to claim 3, it is characterised in that:
If there is k bar access path L1, L2 ..., Lk between starting P2P wireless terminals b1 and target P2P wireless terminals bn, its In, k is greater than 1 positive integer, then the step of selecting optimal access path is as follows:
Step B1, calculates the summation W ' of the network bandwidth between each two P2P wireless terminals in access path L1, L2 ..., Lk respectively 1, W ' 2 ..., W ' k;
According to the connection number in every access path L1, L2 ..., Lk, the averaging network bandwidth W1 of every access path is calculated, W2 ..., Wk;
Wherein, the P2P wireless terminal quantity that the connection number in an access path is defined as in the access path subtracts 1;
Step B2, calculates the connection setup time that is averaged in access path L1, L2 ..., Lk between each two P2P wireless terminals respectively Summation T ' 1, T ' 2 ..., T ' k;
According to the connection number in every access path L1, L2 ..., Lk, total connection setup time T1 of every access path is calculated, T2 ..., Tk;
Step B3, respectively by access path L1, L2 ..., the successful connection probability phase in Lk between each two P2P wireless terminals Multiply, obtain every access path connects into power C1, C2 ..., Ck;
Step B4, respectively by access path L1, L2 ..., the data transfer integrity in Lk between each two P2P wireless terminals is general Rate is multiplied, and obtains data transfer the percentage of head rice I1, I2 ..., Ik of every access path;
Step B5, according to the data obtained in above-mentioned steps, calculates access path L1, L2 ..., Lk assessment parameter respectively Ф 1, Ф 2 ..., Ф k, the maximum access path of selection assessment parameter value are used as optimal access path;Specifically, road is accessed Footpath Li assessment parameter Ф i calculation formula is as follows:
Ф i=lg (Wi+1)/lg (Ti+1) * (3Ci+2Ii)2
Wherein, i is positive integer, and 1≤i≤k.
5. method according to claim 4, it is characterised in that:
When it is determined that after the target P2P wireless terminal bn, in the starting P2P wireless terminals b1 and target P2P wireless terminals Before carrying out data transmission between bn, in addition to authentication process itself, it is specific as follows:
Step V1, bn one random number R of generation, sends it to b1;
Step V2, b1 are received after the random number R of bn generations, one private key Ks of generation and two public keys Kp1 and Kp2;
Wherein, (Kp1)2+(Kp2)2=R2
Then, public key Kp1 and Kp2 are returned to bn by b1;
Step V3, bn is verified after receiving public key Kp1 and Kp2 to it, if (Kp1)2+(Kp2)2≠R2, then authentication mistake Lose, terminate communication;Otherwise, R is encrypted using public key Kp1 and Kp2 respectively, encryption data E (Kp1) and E (Kp2) is sent To b1;
Step V4, b1 are decrypted using private key Ks to the encryption data E (Kp1) and E (Kp2) that receive, if decrypted result is all R, Then authentication passes through, and shows that normal data transfer can be carried out between b1 and bn;Otherwise, authentication fails, and terminates logical Letter.
CN201510151750.3A 2015-04-01 2015-04-01 A kind of information processing method based on wireless Internet of Things Expired - Fee Related CN104767749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510151750.3A CN104767749B (en) 2015-04-01 2015-04-01 A kind of information processing method based on wireless Internet of Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510151750.3A CN104767749B (en) 2015-04-01 2015-04-01 A kind of information processing method based on wireless Internet of Things

Publications (2)

Publication Number Publication Date
CN104767749A CN104767749A (en) 2015-07-08
CN104767749B true CN104767749B (en) 2017-11-03

Family

ID=53649356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510151750.3A Expired - Fee Related CN104767749B (en) 2015-04-01 2015-04-01 A kind of information processing method based on wireless Internet of Things

Country Status (1)

Country Link
CN (1) CN104767749B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027523B (en) * 2016-05-20 2019-01-25 深圳市永兴元科技股份有限公司 The collecting method and distributed data system of distributed data system
CN113422786B (en) * 2021-08-24 2021-11-30 机械科学研究总院江苏分院有限公司 Communication system and communication method based on Internet of things equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951695A (en) * 2010-08-09 2011-01-19 李守林 Internet of things based public food sanitation safety protection service system and working method thereof
CN102932790A (en) * 2012-10-31 2013-02-13 江苏博智软件科技有限公司 Mobile-communication-network-based security authentication method of Internet of Things
CN103634325A (en) * 2013-12-16 2014-03-12 重庆邮电大学 Intelligent domestic Internet of Things security control method and system
CN104065754A (en) * 2014-07-14 2014-09-24 昆明联诚科技股份有限公司 Wireless sensor network based on P2P technology and construction method thereof
CN104426726A (en) * 2013-09-11 2015-03-18 郑州朗鑫智能电子科技有限公司 Intelligent home system for protecting privacy and information safety of user
CN104468614A (en) * 2014-12-25 2015-03-25 无锡成电科大科技发展有限公司 Smart home Internet of Things security control system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9614964B2 (en) * 2005-08-19 2017-04-04 Nextstep, Inc. Consumer electronic registration, control and support concierge device and method
US9225793B2 (en) * 2011-01-28 2015-12-29 Cisco Technology, Inc. Aggregating sensor data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951695A (en) * 2010-08-09 2011-01-19 李守林 Internet of things based public food sanitation safety protection service system and working method thereof
CN102932790A (en) * 2012-10-31 2013-02-13 江苏博智软件科技有限公司 Mobile-communication-network-based security authentication method of Internet of Things
CN104426726A (en) * 2013-09-11 2015-03-18 郑州朗鑫智能电子科技有限公司 Intelligent home system for protecting privacy and information safety of user
CN103634325A (en) * 2013-12-16 2014-03-12 重庆邮电大学 Intelligent domestic Internet of Things security control method and system
CN104065754A (en) * 2014-07-14 2014-09-24 昆明联诚科技股份有限公司 Wireless sensor network based on P2P technology and construction method thereof
CN104468614A (en) * 2014-12-25 2015-03-25 无锡成电科大科技发展有限公司 Smart home Internet of Things security control system

Also Published As

Publication number Publication date
CN104767749A (en) 2015-07-08

Similar Documents

Publication Publication Date Title
CN111209334B (en) Power terminal data security management method based on block chain
EP2747335B1 (en) Device and method for puf-based inter-device security authentication in machine-to-machine communication
Wei et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks
CN102171969B (en) A method for operating a network, a system management device, a network and a computer program therefor
CN106357649A (en) User identity authentication system and method
CN105553648A (en) Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system
US7877503B2 (en) Method and system for an intercept chain of custody protocol
CN103095696A (en) Identity authentication and key agreement method suitable for electricity consumption information collection system
CN109359464B (en) Wireless security authentication method based on block chain technology
CN108566273A (en) Identity authorization system based on quantum network
CN102868702B (en) System login device and system login method
CN108650028A (en) Multiple identity authorization system and method based on quantum communication network and true random number
CN106960166A (en) A kind of smart jack management system and its method based on distributed general ledger technology
CN113055176B (en) Terminal authentication method and system, terminal device, P2P verification platform and medium
CN108809633A (en) A kind of identity authentication method, apparatus and system
Recabarren et al. Tithonus: A bitcoin based censorship resilient system
CN109962777A (en) The key in block catenary system is permitted to generate, obtain the method and apparatus of key
CN108632042A (en) A kind of class AKA identity authorization systems and method based on pool of symmetric keys
CN106878015A (en) Encryption satellite communication system and method
CN108964895B (en) User-to-User identity authentication system and method based on group key pool and improved Kerberos
CN107836095A (en) Method for producing secret or key in a network
CN104869567B (en) A kind of information processing method based on Intelligent terminal for Internet of things
CN104767749B (en) A kind of information processing method based on wireless Internet of Things
CN101938741A (en) Method, system and device for mutual authentication
CN110191467A (en) A kind of method for authenticating of internet of things equipment, unit and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Li Wenbai

Inventor after: Lin Feilong

Inventor after: Li Huxiong

Inventor after: Lu Jianfeng

Inventor after: Pan Zhusheng

Inventor before: Wang Meiting

TA01 Transfer of patent application right

Effective date of registration: 20170920

Address after: 321000 Zhejiang province Jinhua City Yingbin Road No. 688

Applicant after: ZHEJIANG NORMAL University

Address before: West high tech Zone Fucheng Road in Chengdu city of Sichuan province 610000 399 No. 6 Building 1 unit 6 floor No. 6

Applicant before: CHENGDU YICHEN DEXUN TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200609

Address after: 311700 room 402, floor 4, No.118, Pingshan Road, Qiandaohu Town, Chun'an County, Hangzhou City, Zhejiang Province

Patentee after: Zhejiang Shanghua Electronic Technology Co.,Ltd.

Address before: Room 2-102, building 19, Guangrun Hancheng (Building 8, tingfengge), No. 2500, Liyu East Road, duohu street, Jindong District, Jinhua City, Zhejiang Province

Patentee before: Jinhua Lingxi Intelligent Technology Co.,Ltd.

Effective date of registration: 20200609

Address after: Room 2-102, building 19, Guangrun Hancheng (Building 8, tingfengge), No. 2500, Liyu East Road, duohu street, Jindong District, Jinhua City, Zhejiang Province

Patentee after: Jinhua Lingxi Intelligent Technology Co.,Ltd.

Address before: 321000 No. 688 Yingbin Road, Zhejiang, Jinhua

Patentee before: ZHEJIANG NORMAL University

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171103

Termination date: 20210401