CN109413027B - Distributed block chain data authorization encryption method based on Bluetooth Mesh - Google Patents

Distributed block chain data authorization encryption method based on Bluetooth Mesh Download PDF

Info

Publication number
CN109413027B
CN109413027B CN201810993295.5A CN201810993295A CN109413027B CN 109413027 B CN109413027 B CN 109413027B CN 201810993295 A CN201810993295 A CN 201810993295A CN 109413027 B CN109413027 B CN 109413027B
Authority
CN
China
Prior art keywords
data
layer
bluetooth mesh
network
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810993295.5A
Other languages
Chinese (zh)
Other versions
CN109413027A (en
Inventor
李通越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Maishi Information Technology Co ltd
Original Assignee
Shanghai Maishi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Maishi Information Technology Co ltd filed Critical Shanghai Maishi Information Technology Co ltd
Priority to CN201810993295.5A priority Critical patent/CN109413027B/en
Publication of CN109413027A publication Critical patent/CN109413027A/en
Application granted granted Critical
Publication of CN109413027B publication Critical patent/CN109413027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a distributed block chain data authorization encryption method based on Bluetooth Mesh, which comprises the following steps: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node; when data encryption is carried out, a data list and an encryption algorithm are established in a data layer; establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer; the whole network of the invention completes the block chain structure with decentralization, high safety and stability of the network by using a distributed encryption mode, ensures the reliability and the non-replicability of data in the whole network, and the Bluetooth Mesh is mostly applied to the fields of intelligent home, intelligent cities and the like at present, can ensure the non-replicability of each node by using the distributed authorization and the encryption, and provides a uniform platform for information tracing.

Description

Distributed block chain data authorization encryption method based on Bluetooth Mesh
Technical Field
The invention relates to an encryption method, in particular to a distributed block chain data authorization encryption method based on Bluetooth Mesh.
Background
Since the first computer was born, and after decades of high-speed development, information technology has entered the aspects of our lives, and we have continuously changed our lives, and we have entered an information era of information explosion, and it is difficult to realize effective storage and transmission of a large amount of information by means of a conventional method, so that development of information technology based on computer technology and network technology is very important.
Bluetooth is used as an open specification of short-distance wireless data and voice communication, works in a free frequency band of a 2.4GHz ISM, adopts a rapid frequency hopping spread spectrum technology, has the advantages of high communication speed, low power consumption, low cost, strong interference resistance and the like, and is widely applied to various fields in life, however, due to the fact that the technology adopts a wireless transmission mode, user data can be stolen by illegal users in transmission, the rapid frequency hopping technology adopted by Bluetooth can only solve the problem of relevant interference caused by devices inside and outside a system, access of the illegal users cannot be effectively found, higher requirements for the safety and the privacy of each node are provided in the process of using Bluetooth Mesh, and based on the characteristic of Mesh distribution, the block chain technology can be utilized to encrypt the system data.
Disclosure of Invention
The invention aims to provide a distributed block chain data authorization encryption method based on Bluetooth Mesh, so as to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a distributed block chain data authorization encryption method based on Bluetooth Mesh comprises the following steps:
s10: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node;
s20: when data encryption is carried out, a data list and an encryption algorithm are established in a data layer, single-point encryption operation is carried out on effective data of each node, independence of each node is realized, and a chain structure is formed by using local serial number sequence record;
s30: establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer;
s40: and establishing an authorized contract of the Bluetooth Mesh node in a contract layer to determine the information contract rule of each new node when the node is newly added into the network or exits the network.
As a preferred technical scheme of the invention, the network layer is a networking protocol of Bluetooth Mesh, and the protocol is established on a Mesh connection structure to carry out data bidirectional communication.
As a preferred technical scheme of the invention, the data of each Bluetooth Mesh node on an application layer is subjected to local data management application and the data of the whole Bluetooth Mesh network is inquired and acquired.
As a preferred technical scheme of the invention, the encryption algorithm adopts a hash algorithm, and the data signature adopts an asymmetric algorithm.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, the whole network completes the decentralized network, the block chain structure with high safety and stability and ensures the reliability and the non-replicability of data in the whole network by using a distributed encryption mode, the Bluetooth Mesh is mostly applied to the fields of smart homes, smart cities and the like at present, the non-replicability of each node can be ensured by using distributed authorization and encryption, and a unified platform is provided for information tracing.
Drawings
Fig. 1 is a flowchart of a distributed block chain data authorization encryption method based on bluetooth Mesh according to the present invention;
fig. 2 is a system diagram of a distributed block chain data authorization encryption method based on bluetooth Mesh according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1 and fig. 2, the present invention provides a distributed blockchain data authorization encryption method based on bluetooth Mesh, including the following steps:
s10: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node;
s20: when data encryption is carried out, a data list and an encryption algorithm are established in a data layer, single-point encryption operation is carried out on effective data of each node, independence of each node is realized, and a chain structure is formed by using local serial number sequence record;
when data encryption is carried out, for a Bluetooth node, generally, the performance requirement is low, and some embedded databases and lightweight encryption algorithms are required; in case of insufficient performance, the data list can be used directly; for security, data needs to be encrypted, the encryption algorithm mostly uses a hash algorithm, and the signature uses an asymmetric algorithm, such as RSA with a small relative calculation amount and ECC elliptic curve algorithm with a strong complexity.
S30: establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer;
the method has the advantages that the single node data can be identified as validity in the whole Mesh network, the PBFT practical Byzantine fault-tolerant algorithm is used for the application direction of the Bluetooth Mesh, the copy of a state machine is copied at each node, and every two nodes are mutually responded and interactively judged to realize the consensus of the network.
S40: establishing an authorized contract of the Bluetooth Mesh node in a contract layer to determine an information contract rule of each new node when the new node is newly added into the network or exits from the network;
different authorization rules may be modified for different application scenarios.
As a preferred technical scheme of the invention, the network layer is a networking protocol of Bluetooth Mesh, and the protocol is established on a Mesh connection structure to carry out data bidirectional communication.
As a preferred technical scheme of the invention, the data of each Bluetooth Mesh node on an application layer is subjected to local data management application and the data of the whole Bluetooth Mesh network is inquired and acquired.
Based on the above, the invention has the advantages that: according to the invention, the whole network completes the decentralized network, the block chain structure with high safety and stability and ensures the reliability and the non-replicability of data in the whole network by using a distributed encryption mode, the Bluetooth Mesh is mostly applied to the fields of smart homes, smart cities and the like at present, the non-replicability of each node can be ensured by using distributed authorization and encryption, and a unified platform is provided for information tracing.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. A distributed block chain data authorization encryption method based on Bluetooth Mesh is characterized by comprising the following steps:
s10: establishing a self data layer, a network layer, a consensus layer, a contract layer and an application layer on each node;
s20: when data encryption is carried out, a data list and an encryption algorithm are established in a data layer, single-point encryption operation is carried out on effective data of each node, independence of each node is realized, and a chain structure is formed by using local serial number sequence record;
s30: establishing a consensus algorithm in the Bluetooth Mesh network in a consensus layer;
s40: and establishing an authorized contract of the Bluetooth Mesh node in a contract layer to determine the information contract rule of each new node when the node is newly added into the network or exits the network.
2. The bluetooth Mesh-based distributed block chain data authorization encryption method according to claim 1, characterized in that: the network layer is a networking protocol of Bluetooth Mesh, and the protocol is established on a Mesh connection structure to carry out data bidirectional communication.
3. The bluetooth Mesh-based distributed block chain data authorization encryption method according to claim 1, characterized in that: and performing local data management application on the data of each Bluetooth Mesh node on the application layer, and inquiring and acquiring the data of the whole Bluetooth Mesh network.
4. The bluetooth Mesh-based distributed block chain data authorization encryption method according to claim 1, characterized in that: the encryption algorithm adopts a hash algorithm, and the data signature is used as an asymmetric algorithm.
CN201810993295.5A 2018-08-29 2018-08-29 Distributed block chain data authorization encryption method based on Bluetooth Mesh Active CN109413027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810993295.5A CN109413027B (en) 2018-08-29 2018-08-29 Distributed block chain data authorization encryption method based on Bluetooth Mesh

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810993295.5A CN109413027B (en) 2018-08-29 2018-08-29 Distributed block chain data authorization encryption method based on Bluetooth Mesh

Publications (2)

Publication Number Publication Date
CN109413027A CN109413027A (en) 2019-03-01
CN109413027B true CN109413027B (en) 2021-09-14

Family

ID=65463599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810993295.5A Active CN109413027B (en) 2018-08-29 2018-08-29 Distributed block chain data authorization encryption method based on Bluetooth Mesh

Country Status (1)

Country Link
CN (1) CN109413027B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111540088A (en) * 2020-04-21 2020-08-14 深圳众享互联科技有限公司 Fingerprint lock control system and method based on block chain and Mesh network
CN112566114B (en) * 2020-11-25 2023-03-17 四川易诚智讯科技有限公司 WLAN (Wireless local area network) mesh network secure communication method based on block chain
CN113079014A (en) * 2021-03-08 2021-07-06 朔州市驭通智能家居科技有限公司 Intelligent home platform based on block chain technology
CN114553893B (en) * 2022-02-22 2023-06-27 曲阜师范大学 Data replication method and system for block chain parameter relation in cloud side environment
CN115802305B (en) * 2022-12-08 2024-08-23 广州市数网科技有限公司 Intelligent street lamp management system based on block chain technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219678A (en) * 2013-05-30 2014-12-17 启碁科技股份有限公司 Method of establishing smart architecture cell mesh network
WO2018093745A1 (en) * 2016-11-16 2018-05-24 StreamSpace, LLC Decentralized nodal network for providing security of files in distributed filesystems
CN108171068A (en) * 2017-12-31 2018-06-15 天津大学 A kind of student status certification alliance catenary system and its operation method
CN108366362A (en) * 2018-02-01 2018-08-03 乐鑫信息科技(上海)有限公司 MESH network and its MESH equipment safeties match network method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9485243B2 (en) * 2014-05-23 2016-11-01 Google Inc. Securing a wireless mesh network via a chain of trust

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104219678A (en) * 2013-05-30 2014-12-17 启碁科技股份有限公司 Method of establishing smart architecture cell mesh network
WO2018093745A1 (en) * 2016-11-16 2018-05-24 StreamSpace, LLC Decentralized nodal network for providing security of files in distributed filesystems
CN108171068A (en) * 2017-12-31 2018-06-15 天津大学 A kind of student status certification alliance catenary system and its operation method
CN108366362A (en) * 2018-02-01 2018-08-03 乐鑫信息科技(上海)有限公司 MESH network and its MESH equipment safeties match network method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"以区块链技术为核心的物联网安全解决对策研究";姜威,姜泽睿;《通信技术》;20180630(第6期);全文 *

Also Published As

Publication number Publication date
CN109413027A (en) 2019-03-01

Similar Documents

Publication Publication Date Title
CN109413027B (en) Distributed block chain data authorization encryption method based on Bluetooth Mesh
CN110024352B (en) Decentralized data storage and processing for IOT devices
Cao et al. [Retracted] IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security
Qu et al. Blockchain based credibility verification method for IoT entities
CN109889522B (en) Block chain-based Internet of things information security protection method
Roman et al. Securing the internet of things
Choi et al. An efficient key pre-distribution scheme for secure distributed sensor networks
Jerbi et al. CoopECC: a collaborative cryptographic mechanism for the internet of things
Li et al. Zero trust in edge computing environment: a blockchain based practical scheme
Zhong et al. Data Security Storage Method for Power Distribution Internet of Things in Cyber‐Physical Energy Systems
Shafiq et al. SoftSystem: smart edge computing device selection method for IoT based on soft set technique
Khodaei et al. Privacy Preservation through Uniformity
Miyaji et al. Self‐healing wireless sensor networks
Zhang et al. VSpatial: Enabling Private and Verifiable Spatial Keyword-based Positioning in 6G-oriented IoT
Igiri et al. Blockchain versus iota tangle for internet of things: The best architecture
Ataşen et al. Designing a Secure IoT Network by Using Blockchain
Tan et al. Providing an effective key management scheme to increase transaction security of homogeneous mobile wireless sensor networks
Saminathan et al. Development of an Energy-Efficient, Secure and Reliable Wireless Sensor Networks Routing Protocol Based on Data Aggregation and User Authentication
Karbasi et al. Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks
Moradi et al. Enhancing security on social networks with IoT-based blockchain hierarchical structures with Markov chain
Ali et al. A Lightweight Trust-less Authentication Framework for Massive IoT Systems
Chen et al. Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree
Mariammal et al. Ensuring higher security for gathering and economically distributing the data in social wireless sensor networks
Zhou et al. A novel WSN key pre–distribution scheme based on group–deployment
Barad et al. Improvement of deterministic key management scheme for securing cluster-based sensor networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant