CN109413027B - Distributed block chain data authorization encryption method based on Bluetooth Mesh - Google Patents
Distributed block chain data authorization encryption method based on Bluetooth Mesh Download PDFInfo
- Publication number
- CN109413027B CN109413027B CN201810993295.5A CN201810993295A CN109413027B CN 109413027 B CN109413027 B CN 109413027B CN 201810993295 A CN201810993295 A CN 201810993295A CN 109413027 B CN109413027 B CN 109413027B
- Authority
- CN
- China
- Prior art keywords
- data
- layer
- bluetooth mesh
- network
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a distributed block chain data authorization encryption method based on Bluetooth Mesh, which comprises the following steps: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node; when data encryption is carried out, a data list and an encryption algorithm are established in a data layer; establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer; the whole network of the invention completes the block chain structure with decentralization, high safety and stability of the network by using a distributed encryption mode, ensures the reliability and the non-replicability of data in the whole network, and the Bluetooth Mesh is mostly applied to the fields of intelligent home, intelligent cities and the like at present, can ensure the non-replicability of each node by using the distributed authorization and the encryption, and provides a uniform platform for information tracing.
Description
Technical Field
The invention relates to an encryption method, in particular to a distributed block chain data authorization encryption method based on Bluetooth Mesh.
Background
Since the first computer was born, and after decades of high-speed development, information technology has entered the aspects of our lives, and we have continuously changed our lives, and we have entered an information era of information explosion, and it is difficult to realize effective storage and transmission of a large amount of information by means of a conventional method, so that development of information technology based on computer technology and network technology is very important.
Bluetooth is used as an open specification of short-distance wireless data and voice communication, works in a free frequency band of a 2.4GHz ISM, adopts a rapid frequency hopping spread spectrum technology, has the advantages of high communication speed, low power consumption, low cost, strong interference resistance and the like, and is widely applied to various fields in life, however, due to the fact that the technology adopts a wireless transmission mode, user data can be stolen by illegal users in transmission, the rapid frequency hopping technology adopted by Bluetooth can only solve the problem of relevant interference caused by devices inside and outside a system, access of the illegal users cannot be effectively found, higher requirements for the safety and the privacy of each node are provided in the process of using Bluetooth Mesh, and based on the characteristic of Mesh distribution, the block chain technology can be utilized to encrypt the system data.
Disclosure of Invention
The invention aims to provide a distributed block chain data authorization encryption method based on Bluetooth Mesh, so as to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a distributed block chain data authorization encryption method based on Bluetooth Mesh comprises the following steps:
s10: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node;
s20: when data encryption is carried out, a data list and an encryption algorithm are established in a data layer, single-point encryption operation is carried out on effective data of each node, independence of each node is realized, and a chain structure is formed by using local serial number sequence record;
s30: establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer;
s40: and establishing an authorized contract of the Bluetooth Mesh node in a contract layer to determine the information contract rule of each new node when the node is newly added into the network or exits the network.
As a preferred technical scheme of the invention, the network layer is a networking protocol of Bluetooth Mesh, and the protocol is established on a Mesh connection structure to carry out data bidirectional communication.
As a preferred technical scheme of the invention, the data of each Bluetooth Mesh node on an application layer is subjected to local data management application and the data of the whole Bluetooth Mesh network is inquired and acquired.
As a preferred technical scheme of the invention, the encryption algorithm adopts a hash algorithm, and the data signature adopts an asymmetric algorithm.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, the whole network completes the decentralized network, the block chain structure with high safety and stability and ensures the reliability and the non-replicability of data in the whole network by using a distributed encryption mode, the Bluetooth Mesh is mostly applied to the fields of smart homes, smart cities and the like at present, the non-replicability of each node can be ensured by using distributed authorization and encryption, and a unified platform is provided for information tracing.
Drawings
Fig. 1 is a flowchart of a distributed block chain data authorization encryption method based on bluetooth Mesh according to the present invention;
fig. 2 is a system diagram of a distributed block chain data authorization encryption method based on bluetooth Mesh according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 and fig. 2, the present invention provides a distributed blockchain data authorization encryption method based on bluetooth Mesh, including the following steps:
s10: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node;
s20: when data encryption is carried out, a data list and an encryption algorithm are established in a data layer, single-point encryption operation is carried out on effective data of each node, independence of each node is realized, and a chain structure is formed by using local serial number sequence record;
when data encryption is carried out, for a Bluetooth node, generally, the performance requirement is low, and some embedded databases and lightweight encryption algorithms are required; in case of insufficient performance, the data list can be used directly; for security, data needs to be encrypted, the encryption algorithm mostly uses a hash algorithm, and the signature uses an asymmetric algorithm, such as RSA with a small relative calculation amount and ECC elliptic curve algorithm with a strong complexity.
S30: establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer;
the method has the advantages that the single node data can be identified as validity in the whole Mesh network, the PBFT practical Byzantine fault-tolerant algorithm is used for the application direction of the Bluetooth Mesh, the copy of a state machine is copied at each node, and every two nodes are mutually responded and interactively judged to realize the consensus of the network.
S40: establishing an authorized contract of the Bluetooth Mesh node in a contract layer to determine an information contract rule of each new node when the new node is newly added into the network or exits from the network;
different authorization rules may be modified for different application scenarios.
As a preferred technical scheme of the invention, the network layer is a networking protocol of Bluetooth Mesh, and the protocol is established on a Mesh connection structure to carry out data bidirectional communication.
As a preferred technical scheme of the invention, the data of each Bluetooth Mesh node on an application layer is subjected to local data management application and the data of the whole Bluetooth Mesh network is inquired and acquired.
Based on the above, the invention has the advantages that: according to the invention, the whole network completes the decentralized network, the block chain structure with high safety and stability and ensures the reliability and the non-replicability of data in the whole network by using a distributed encryption mode, the Bluetooth Mesh is mostly applied to the fields of smart homes, smart cities and the like at present, the non-replicability of each node can be ensured by using distributed authorization and encryption, and a unified platform is provided for information tracing.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. A distributed block chain data authorization encryption method based on Bluetooth Mesh is characterized by comprising the following steps:
s10: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node;
s20: when data encryption is carried out, a data list and an encryption algorithm are established in a data layer, single-point encryption operation is carried out on effective data of each node, independence of each node is realized, and a chain structure is formed by using local serial number sequence record;
s30: establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer;
s40: and establishing an authorized contract of the Bluetooth Mesh node in a contract layer to determine the information contract rule of each new node when the node is newly added into the network or exits the network.
2. The bluetooth Mesh-based distributed block chain data authorization encryption method according to claim 1, characterized in that: the network layer is a networking protocol of Bluetooth Mesh, and the protocol is established on a Mesh connection structure to carry out data bidirectional communication.
3. The bluetooth Mesh-based distributed block chain data authorization encryption method according to claim 1, characterized in that: and performing local data management application on the data of each Bluetooth Mesh node on the application layer, and inquiring and acquiring the data of the whole Bluetooth Mesh network.
4. The bluetooth Mesh-based distributed block chain data authorization encryption method according to claim 1, characterized in that: the encryption algorithm adopts a hash algorithm, and the data signature is used as an asymmetric algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810993295.5A CN109413027B (en) | 2018-08-29 | 2018-08-29 | Distributed block chain data authorization encryption method based on Bluetooth Mesh |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810993295.5A CN109413027B (en) | 2018-08-29 | 2018-08-29 | Distributed block chain data authorization encryption method based on Bluetooth Mesh |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109413027A CN109413027A (en) | 2019-03-01 |
CN109413027B true CN109413027B (en) | 2021-09-14 |
Family
ID=65463599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810993295.5A Active CN109413027B (en) | 2018-08-29 | 2018-08-29 | Distributed block chain data authorization encryption method based on Bluetooth Mesh |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109413027B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111540088A (en) * | 2020-04-21 | 2020-08-14 | 深圳众享互联科技有限公司 | Fingerprint lock control system and method based on block chain and Mesh network |
CN112566114B (en) * | 2020-11-25 | 2023-03-17 | 四川易诚智讯科技有限公司 | WLAN (Wireless local area network) mesh network secure communication method based on block chain |
CN113079014A (en) * | 2021-03-08 | 2021-07-06 | 朔州市驭通智能家居科技有限公司 | Intelligent home platform based on block chain technology |
CN114553893B (en) * | 2022-02-22 | 2023-06-27 | 曲阜师范大学 | Data replication method and system for block chain parameter relation in cloud side environment |
CN115802305B (en) * | 2022-12-08 | 2024-08-23 | 广州市数网科技有限公司 | Intelligent street lamp management system based on block chain technology |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104219678A (en) * | 2013-05-30 | 2014-12-17 | 启碁科技股份有限公司 | Method of establishing smart architecture cell mesh network |
WO2018093745A1 (en) * | 2016-11-16 | 2018-05-24 | StreamSpace, LLC | Decentralized nodal network for providing security of files in distributed filesystems |
CN108171068A (en) * | 2017-12-31 | 2018-06-15 | 天津大学 | A kind of student status certification alliance catenary system and its operation method |
CN108366362A (en) * | 2018-02-01 | 2018-08-03 | 乐鑫信息科技(上海)有限公司 | MESH network and its MESH equipment safeties match network method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9485243B2 (en) * | 2014-05-23 | 2016-11-01 | Google Inc. | Securing a wireless mesh network via a chain of trust |
-
2018
- 2018-08-29 CN CN201810993295.5A patent/CN109413027B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104219678A (en) * | 2013-05-30 | 2014-12-17 | 启碁科技股份有限公司 | Method of establishing smart architecture cell mesh network |
WO2018093745A1 (en) * | 2016-11-16 | 2018-05-24 | StreamSpace, LLC | Decentralized nodal network for providing security of files in distributed filesystems |
CN108171068A (en) * | 2017-12-31 | 2018-06-15 | 天津大学 | A kind of student status certification alliance catenary system and its operation method |
CN108366362A (en) * | 2018-02-01 | 2018-08-03 | 乐鑫信息科技(上海)有限公司 | MESH network and its MESH equipment safeties match network method |
Non-Patent Citations (1)
Title |
---|
"以区块链技术为核心的物联网安全解决对策研究";姜威,姜泽睿;《通信技术》;20180630(第6期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN109413027A (en) | 2019-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109413027B (en) | Distributed block chain data authorization encryption method based on Bluetooth Mesh | |
CN110024352B (en) | Decentralized data storage and processing for IOT devices | |
Cao et al. | [Retracted] IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security | |
Qu et al. | Blockchain based credibility verification method for IoT entities | |
CN109889522B (en) | Block chain-based Internet of things information security protection method | |
Roman et al. | Securing the internet of things | |
Choi et al. | An efficient key pre-distribution scheme for secure distributed sensor networks | |
Jerbi et al. | CoopECC: a collaborative cryptographic mechanism for the internet of things | |
Li et al. | Zero trust in edge computing environment: a blockchain based practical scheme | |
Zhong et al. | Data Security Storage Method for Power Distribution Internet of Things in Cyber‐Physical Energy Systems | |
Shafiq et al. | SoftSystem: smart edge computing device selection method for IoT based on soft set technique | |
Khodaei et al. | Privacy Preservation through Uniformity | |
Miyaji et al. | Self‐healing wireless sensor networks | |
Zhang et al. | VSpatial: Enabling Private and Verifiable Spatial Keyword-based Positioning in 6G-oriented IoT | |
Igiri et al. | Blockchain versus iota tangle for internet of things: The best architecture | |
Ataşen et al. | Designing a Secure IoT Network by Using Blockchain | |
Tan et al. | Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks | |
Saminathan et al. | Development of an Energy-Efficient, Secure and Reliable Wireless Sensor Networks Routing Protocol Based on Data Aggregation and User Authentication | |
Karbasi et al. | Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks | |
Moradi et al. | Enhancing security on social networks with IoT-based blockchain hierarchical structures with Markov chain | |
Ali et al. | A Lightweight Trust-less Authentication Framework for Massive IoT Systems | |
Chen et al. | Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree | |
Mariammal et al. | Ensuring higher security for gathering and economically distributing the data in social wireless sensor networks | |
Zhou et al. | A novel WSN key pre–distribution scheme based on group–deployment | |
Barad et al. | Improvement of deterministic key management scheme for securing cluster-based sensor networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |