Disclosure of Invention
In order to solve the technical problems, the invention provides an industrial Internet equipment authentication method based on multi-mode information fusion, which adopts a recursive pyramid structure, and provides a safe and efficient equipment authentication solution by combining the multi-mode information fusion and a layered structure, thereby being beneficial to protecting equipment and data in the industrial Internet from unauthorized access and potential security threat.
In order to achieve the above purpose, the invention is realized by the following technical scheme:
the invention relates to an industrial Internet equipment authentication method based on multi-mode information fusion, which comprises the following steps:
Step 1, constructing an authentication structure: building a pyramid authentication structure in the authentication system, wherein each side of the bottom layer of the pyramid authentication structure is provided with 2 k pieces of first information, each side of the second layer is provided with 2 k-1 pieces of second information, and the n layer is provided with 2 0 pieces of n information;
Step 2, industrial internet equipment authentication: the industrial internet equipment sends a request authentication to an authentication system, and the authentication system retrieves information and fuses the information in the pyramidal authentication structure in the step 1 layer by layer to generate an authentication token;
Step 3, authentication token verification: the authentication system performs validity check on the authentication token provided by the industrial Internet equipment, and then reversely traces back the generation path of the authentication token, and performs integrity check on the authentication token;
Step 4, outputting an authentication result: if the authentication token passes the verification of all layers on the authentication mechanism and the integrity check is correct, the equipment authentication is successful, otherwise, if any one step of verification fails, the equipment authentication fails, and the system refuses the access request of the equipment.
The invention further improves that: the pyramid authentication structure is regular polygon, the number of sides of the regular polygon is m, each side of the pyramid authentication structure independently performs equipment authentication flow, an information barrier is arranged between each side of the same layer, each side of the information barrier is an independent authentication channel, and a firewall is arranged to isolate information of each side of the same layer.
The invention further improves that: in the step 1, the first information, the second information and the nth information represent different types of data, and as the number of layers on the pyramidal authentication structure increases, the carried information is gradually complex and diversified, and the information sequentially includes: device ID, serial number, manufacturer information, operating system version, maintenance records, software update log, security patch application records, real-time running status of the device, network activity records, abnormal behavior detection results, and user access log.
The invention further improves that: the industrial internet equipment authentication in the step 2 specifically comprises the following steps:
Step 2.1, equipment requests authentication: the industrial Internet equipment sends an equipment ID to an authentication system as initial authentication information;
step 2.2, information retrieval: the authentication system retrieves corresponding information at the bottom layer of the authentication structure according to the equipment ID;
Step 2.3, information fusion: and fusing information on adjacent sides layer by using a hash function to form new information until the information reaches the top layer of the authentication structure, and generating a unique authentication token by the information fused layer by layer.
The invention further improves that: the information retrieval in said step 2.2 is specifically: after the initial authentication of the authentication system, the authentication system interacts with the docking device through the TLS encrypted communication channel, and then the authentication system carries out comprehensive scanning and information retrieval on the docking device, and directly extracts required basic information flows from an information base of the docking device, wherein the basic information flows are used for constructing a pyramid authentication structure and filling information of each layer.
The invention further improves that: before the information fusion in the step 2.3, firstly, preprocessing data of the extracted basic information stream respectively, and converting information of different types and volumes into a character string in a JSON format, wherein the preprocessing comprises the following steps: data cleansing, data conversion, data aggregation and summary and data formatting.
The invention further improves that: in the step 3, the authentication system performs validity check on the authentication token provided by the industrial internet device, specifically: the authentication system is provided with a database for storing expected and preset authentication token hash values in advance, the authentication system uses the equipment ID extracted from the docking equipment to search corresponding records in the database, the stored hash values are searched, the authentication system compares the searched stored hash values with the authentication token hash values extracted from the docking equipment, and if the two hash values are matched, the authentication system determines that the authentication token is valid.
The invention further improves that: in the step 3, the generation path of the authentication token is traced reversely, and the integrity check of the authentication token specifically comprises the following steps:
Step 3.1, disassembling the authentication token: starting from the authentication token at the top layer, reversely applying a hash function, integrating the authentication flow and the information of the industrial Internet equipment in the step 2, and disassembling the industrial Internet equipment to the bottom layer by layer;
Step 3.2, comparing the original information: comparing each layer of information obtained by disassembling in the step 3.1 with original information stored in an authentication system;
step 3.3, verifying data consistency: ensuring that the information of all layers is consistent in the disassembling and comparing processes, and no difference is found;
Step 3.4, information source verification: all layers of information obtained through disassembly are matched with information retrieved and extracted by the authentication system on the docking equipment, and the integrity and the source definition of all the information used for constructing the authentication structure are determined.
The invention further improves that: the authentication token is a hexadecimal number of 32 bytes in length.
The invention further improves that: the authentication system is also provided with an authentication token cleaning method, which specifically comprises the following steps:
Token updating: the authentication token registered in the database can be invalid due to the factors of user logout, equipment updating and token expiration, and the authentication system needs to update the authentication token state in the database in time;
Token revocation: the authentication system marks the authentication token as invalid in the database and recognizes and denies subsequent authentication requests of the docking device.
The beneficial effects of the invention are as follows:
(1) The invention adopts a recursive pyramid structure, the information of each layer is based on the fusion of the information of the previous layer, and each layer contains hash processing by fusing the information layer by layer in the pyramid structure, so that the authentication token contains all the information of all the layers, the basic information required by equipment authentication is complex, and the basic information is closely related to the operation of the equipment. Compared with the prior art, by combining the multi-mode information fusion and the layered structure, a safe and efficient device authentication solution is provided, and the device and the data in the industrial Internet are protected from unauthorized access and potential security threat.
(2) The invention provides a pyramid authentication structure, wherein each side of the bottom layer of the authentication structure is provided with 2 k pieces of first information, each side of the second layer is provided with 2 k-1 pieces of second information … …, the n layer is provided with 2 0 pieces of n information, the number of information on the edge is reduced according to the steps along with the increase of the number of layers, so that the pyramid authentication structure is formed, and the design of the structure is beneficial to centralized processing and verification of information on the top layer, and meanwhile, enough nodes are provided on the bottom layer to store and process detailed equipment information.
(3) The authentication system directly acquires the basic information from the docking equipment, calculates the basic information and converts the basic information into a format required by the authentication system, thereby avoiding acquisition of the tampered authentication token. The communication between the authentication system and the docking device is performed through the TLS encryption channel, so that the safety in the data transmission process is ensured; the information is directly extracted from the information base of the docking device, so that the authenticity and the integrity of the information can be guaranteed, and the risk of tampering in the transmission or processing process is reduced because the information is not processed by a third party.
(4) The invention provides a pyramid authentication structure, in the process of authenticating Internet equipment, an authentication token is generated by fusing information layer by layer, each fusion of adjacent layer information is processed by using a hash function, under the layer-by-layer fusion, the authentication token generated at the top layer contains all information from all layers, and the authentication token exists in a highly compressed and safe hash function form, so that the information security is ensured, and the authentication process efficiency is improved.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those described herein, and therefore the scope of the present invention is not limited to the specific embodiments disclosed below.
The invention provides an industrial Internet equipment authentication method based on multi-mode information fusion, which adopts a recursive pyramid structure, wherein the information of each layer is based on the fusion of the information of the previous layer, and each layer contains hash processing by fusing the information layer by layer in the pyramid structure, so that an authentication token contains all the information of all the layers, the basic information required by equipment authentication is complex, and the information is closely related to the operation of equipment. Compared with the prior art, by combining the multi-mode information fusion and the layered structure, a safe and efficient device authentication solution is provided, and the device and the data in the industrial Internet are protected from unauthorized access and potential security threat.
As shown in fig. 1, the invention is an industrial internet device authentication method based on multi-mode information fusion, comprising the following steps:
Step 1, constructing an authentication structure: a pyramid authentication structure is built in the authentication system, wherein each side of the bottom layer of the pyramid authentication structure is provided with 2 k pieces of first information, each side of the second layer is provided with 2 k-1 pieces of second information, and the n layer is provided with 2 0 pieces of n information. As the number of layers increases, the amount of information at the edges becomes smaller in order, thereby forming a pyramid-shaped authentication structure, which is designed to facilitate centralized processing and verification of information at the top layer, while providing sufficient nodes at the bottom layer to store and process detailed device information.
As shown in fig. 2, the pyramidal authentication structure is a pyramid structure of a regular polygon, and the number of sides of the regular polygon is m. The number m of the sides of the regular polygon can be adjusted according to actual requirements, which means that the authentication structure has high flexibility and expandability. The proper number m of edges can be selected according to actual conditions so as to meet different safety requirements and performance requirements. The regular polygon pyramid authentication structure has two forms in authentication use:
Each side of the pyramid authentication structure in the form 1 and the regular polygon can independently search and acquire information and fuse information layer by layer, and a plurality of butting devices can simultaneously authenticate without interference. The parallel processing mode can obviously improve the authentication efficiency of the equipment and reduce the load of an authentication system. The method is suitable for accessing the Internet of things equipment for processing simple information, the information processing amount is less, such as a quality sensor and a temperature sensor, the number of edges of the pyramid structure is even, and the access and authentication of a plurality of Internet of things equipment are processed at the same time. For example, in an intelligent fabric production factory, a quality sensor and a temperature sensor are respectively connected, the quality and the temperature of the fabric are monitored, the pyramid authentication structure is 6 sides, namely m=6, and three layers of authentication are carried out on one quality sensor or one temperature sensor on each three sides.
And 2, setting a plurality of sides for independently carrying out information retrieval and acquisition and layer-by-layer information fusion on the same butt joint equipment, generating an authentication token, and finally comparing whether the authentication token is consistent or not at the top layer to ensure that the process of retrieving and acquiring information and layer-by-layer information fusion is normally carried out. The method is suitable for accessing the Internet of things equipment with high safety and complex data information, processes a large amount of data, and performs multiparty authentication on the same Internet of things equipment, wherein the number of edges of the pyramid structure is even or odd. If in intelligent mill, access the supervisory equipment that uses image recognition, judge the defect of production surface fabric through image recognition, the pyramid authentication structure is 5 limit, namely m=5, five limit authentication to supervisory equipment simultaneously.
The first information and the second information … … n information represent different types of data respectively, and as the number of layers on the pyramidal authentication structure increases, the carried information is gradually complex and diversified, and the information comprises the following components in sequence according to the complexity: device ID, serial number, manufacturer information, operating system version, maintenance records, software update log, security patch application records, real-time running status of the device, network activity records, abnormal behavior detection results, and user access log.
The device ID, serial number, manufacturer information, and operating system version are basic information of the docking device for uniquely identifying the device in the authentication system.
The usage history, maintenance records, software update logs, and security patch application records of the device are used as usage and security status information for the docking device for evaluating the trustworthiness and compliance of the device.
The real-time running state of the equipment, the network activity record, the abnormal behavior monitoring result and the user access log are beneficial to monitoring the behavior of the docking equipment in real time, and ensuring that the docking equipment accords with an expected operation mode.
The device ID is made up of several parts including: fixed prefix, serial number, model code and hardware hash; wherein, the fixed prefix: DEV-is a fixed prefix, meaning that it is a device ID; sequence number: a unique serial number of the device, assigned by the manufacturer at the time of device production; model code: is defined by the manufacturer, reflecting the type, specification and function of the device; hardware hashing: based on the hash value generated by the hardware configuration of the equipment, the hardware component information of the butt joint equipment such as the CPU model, the memory size and the hard disk serial number is calculated by a hash algorithm SHA-256.
The invention selects a plurality of kinds of complex equipment operation information as the authentication information for accessing the industrial Internet, so that the authentication information is closely related to the equipment, the difficulty of constructing false equipment is greatly improved, and the security of the industrial Internet authentication is improved.
Step 2, industrial internet equipment authentication: the industrial internet device sends a request authentication to an authentication system, and the authentication system retrieves the information and fuses the information in the pyramidal authentication structure of step 1 layer by layer to generate an authentication token.
The industrial Internet equipment authentication specifically comprises the following steps of:
The device requests authentication: the industrial Internet equipment sends an equipment ID to an authentication system as initial authentication information;
information retrieval: the authentication system retrieves corresponding information at the bottom layer of the authentication structure according to the equipment ID, specifically: after the initial authentication of the authentication system, the authentication system interacts with the docking device through the TLS encrypted communication channel, and then the authentication system carries out comprehensive scanning and information retrieval on the docking device, and directly extracts required basic information flows from an information base of the docking device, wherein the basic information flows are used for constructing a pyramid authentication structure and filling information of each layer.
The authentication system directly acquires the basic information from the docking equipment, calculates the basic information and converts the basic information into a format required by the authentication system, thereby avoiding acquisition of the tampered authentication token. The communication between the authentication system and the docking device is performed through the TLS encryption channel, so that the safety in the data transmission process is ensured. The information is directly extracted from the information base of the docking device, so that the authenticity and the integrity of the information can be guaranteed, and the risk of tampering in the transmission or processing process is reduced because the information is not processed by a third party.
And (3) information fusion: and fusing information on adjacent sides layer by using a hash function to form new information until the information reaches the top layer of the authentication structure, and generating a unique authentication token by the information fused layer by layer.
Before information fusion, firstly respectively preprocessing the extracted information, including:
1. data cleaning:
removing redundant data: deleting duplicate or insignificant information to reduce the amount of data and increase processing efficiency; the data cleansing tool Pandas library is preferably used to identify and delete duplicate records and a recursive feature elimination algorithm is applied to identify and preserve the most important features while removing irrelevant or redundant features.
Processing the missing values: for missing data, padding, interpolation, or deletion may be selected; filling statistical methods such as mean, median, and mode to fill in missing values; for time series data, filling in missing values using linear interpolation; and deleting the record containing the missing value for the data with more missing values.
Correcting errors: identifying and correcting errors in the data, such as spelling errors, format errors, or logical errors; for misspellings, natural language processing library spaCy is used to identify and correct misspellings in the text data; checking and unifying data formats, such as date and time formats, currency formats and the like, by writing custom scripts; logically unreasonable data is identified by data validation rules.
Through the steps, data are cleaned, the quality and accuracy of information extracted from the butt joint equipment are ensured, and the equipment authentication speed and accuracy are improved.
2. Data conversion:
Standardization: data in different formats is converted into a unified format, such as unifying date formats as YYYY-MM-DD.
Normalization: the numerical data is scaled to fall within a small specified interval, such as [0,1] or [ -1,1].
Encoding: non-numeric data such as text or category data is converted to numeric form, preferably using Label Encoding (Label Encoding).
3. Data aggregation and summarization:
The data is abstracted, and a abstracting algorithm SHA-1 is used for carrying out hash operation on maintenance records, software update logs, security patch application records and user access logs of a large amount of data to generate an abstract value with a fixed size.
Data aggregation, which is to regularly aggregate the real-time running state of equipment, network activity records and abnormal behavior monitoring results: and counting the total network traffic and the occurrence times of abnormal behaviors in a specific time period, and taking the counted values as input data.
4. Formatting data:
the processed data is formatted into a character string form suitable for hash operation. This may involve combining multiple fields into one string, or serializing the data into JSON format.
According to the invention, the extracted information is respectively preprocessed, so that the information with different types and volumes is converted into the simple character strings with uniform formats, the data volume and the complexity are reduced, the subsequent hash operation is facilitated, and the efficiency and the reliability of the authentication system are improved.
In this embodiment, the information fusion step: the hash security algorithm SHA-256 is used for information fusion of adjacent layers,
[ \text{Hash Value} =H(\text{JSONString}.\text{encode('utf-8')}) ]
The method comprises the following steps:
# serializing device information into a string in JSON format
serialized_data = json.dumps(device_info, sort_keys=True)
# Convert JSON string to byte sequence
byte_sequence = serialized_data.encode('utf-8')
Hash operation using SHA-256 hash function
hasher = hashlib.sha256()
hasher.update(byte_sequence)
hash_value = hasher.hexdigest()
# Output hash value
print("SHA-256 Hash:", hash_value)
And obtaining new fusion information, and then carrying out layer-by-layer fusion to finally obtain the authentication token, wherein the authentication token is a hexadecimal number with the length of 32 bytes.
The invention provides a pyramid authentication structure, in the process of authenticating Internet equipment, an authentication token is generated by fusing information layer by layer, each fusion of adjacent layer information is processed by using a hash function, under the layer-by-layer fusion, the authentication token generated at the top layer contains all information from all layers, and the authentication token exists in a highly compressed and safe hash function form, so that the information security is ensured, and the authentication process efficiency is improved.
In the industrial internet, information carried on each layer of the authentication structure can ensure that the butt joint equipment is identified not only on a physical level, but also on an operation and behavior level, and meets the requirements of safety and compliance in the process of fusion and verification. In this way, unauthorized devices can be effectively prevented from accessing the network while ensuring safe and efficient use of network resources.
Step 3, authentication token verification: the authentication system performs validity check on the authentication token provided by the industrial Internet equipment, and then reversely traces back the generation path of the authentication token, and performs integrity check on the authentication token. Wherein,
The validity check is specifically as follows: the authentication system is provided with a database for storing expected and preset authentication token hash values in advance, the authentication system uses the equipment ID extracted from the docking equipment to search corresponding records in the database, the stored hash values are searched, the authentication system compares the searched stored hash values with the authentication token hash values extracted from the docking equipment, and if the two hash values are matched, the authentication system determines that the authentication token is valid.
The method for carrying out integrity check on the authentication token comprises the following steps of:
Step 3.1, disassembling the authentication token: starting from the authentication token at the top layer, reversely applying a hash function, integrating the authentication flow and the information of the industrial Internet equipment in the step 2, and disassembling the industrial Internet equipment to the bottom layer by layer;
Step 3.2, comparing the original information: comparing each layer of information obtained by disassembling in the step 3.1 with original information stored in an authentication system;
step 3.3, verifying data consistency: ensuring that the information of all layers is consistent in the disassembling and comparing processes, and no difference is found;
Step 3.4, information source verification: all layers of information obtained through disassembly are matched with information retrieved and extracted by the authentication system on the docking equipment, and the integrity and the source definition of all the information used for constructing the authentication structure are determined.
Step 4, outputting an authentication result: if the authentication token passes the verification of all layers on the authentication mechanism and the integrity check is correct, the equipment authentication is successful, otherwise, if any one step of verification fails, the equipment authentication fails, and the system refuses the access request of the equipment.
The invention can evaluate the correctness of each level of fusion rule by reversely tracing the effective authentication token generation path and implementing the integrity check, and ensure that the information fusion process is not tampered, thereby ensuring the safety and the reliability of the authentication token.
The authentication system is also provided with an authentication token cleaning method, which specifically comprises the following steps:
Token updating: the authentication token registered in the database can be invalid due to the factors of user logout, equipment updating and token expiration, and the authentication system needs to update the authentication token state in the database in time;
Token revocation: a security problem arises in the docking device, and for security reasons, the authentication system marks the authentication token as invalid in the database and identifies and denies subsequent authentication requests for the docking device.
In this embodiment, the authentication system is further provided with a security policy:
Tamper-resistant policy: before information of each layer is fused, the authentication system extracts information required by the layer from the pyramid authentication structure, then the authentication system compares the extracted information with original information stored by the butting equipment in a consistency mode by using a Merkle Tree (Hash Tree), the consistency of information content and a timestamp is detected, the information is prevented from being tampered in the fusion process, and therefore the safety and the reliability of equipment authentication are ensured.
An access control policy comprising the steps of:
Authentication policy: the docking device must authenticate through a pyramid authentication structure to gain access to the industrial internet, and the authentication process includes verification of the device ID, information retrieval, information fusion, and generation and verification of an authentication token.
Access control rules: according to roles such as a sensor, a controller, a management terminal and the like and functions of the docking device, corresponding access rights are allocated, and the access rights of the docking device follow a minimum rights principle, namely only the minimum level rights required for completing the task are granted.
Dynamic access control: the access rights can be dynamically adjusted according to the behavior, network state and security event of the device, working time period and network IP limit are set for each butt joint device, access is limited and refused out of range, the industrial Internet is required to be accessed out of range, and joint permission of a plurality of higher-rights devices is required.
Auditing and monitoring: all authentication attempts and access activities, including successful and failed authentications, are recorded and audit logs are periodically reviewed to detect abnormal behavior and potential security threats.
By implementing the access control strategy, the invention ensures that only authorized systems and devices can access and modify information in the pyramid structure, protects the security of the pyramid authentication structure, and simultaneously provides flexible access control so as to adapt to the continuously changing business requirements and security threats.
To verify the invention, a simulation experiment is provided: a pyramid authentication structure with six levels is constructed on a server, and four layers of information verification are set, including: one layer (device ID), two layers (serial number, manufacturer information, operating system version), three layers (maintenance record, software update log), and four layers (security patch application record). The simulation experiment designs 100 simulation devices in total, each device is provided with unique device ID, serial number and manufacturer information, and corresponding maintenance records and software update logs are generated through simulation. Of these 100 simulation devices, 10 problem simulation devices including an erroneous serial number, tampered maintenance record, and the like are purposely provided, aiming at simulating the situation of unauthorized access and information tampering.
These analog devices send authentication requests to the authentication system at random points in time and may repeat at different times. The authentication system retrieves the relevant information according to the device ID and generates an authentication token through an information fusion technology. The system then verifies the token and details the results of each authentication attempt, including success, failure, and response time.
The results of the simulation experiments are as follows:
In the security test, a total of 26 unauthorized access requests are received, 7 problem simulation devices are involved, and are successfully refused by the authentication system, so that excellent security is shown. In addition, for 11 information tampering attempts, 3 problem simulation devices are involved, and the authentication system can effectively detect the information, so that the validity of the tamper-proof strategy is verified.
In the performance test, when 1 to 3 analog devices simultaneously request authentication, the average response time of the authentication system is 0.5 seconds. While in a high load scenario simulating 6 devices requesting authentication at the same time, the average response time rises to 1.2 seconds, but is still within acceptable limits.
In terms of authentication success rate, 474 simulated authentication attempts are performed by 90 authorized simulated devices, wherein the authentication success rate is as high as 99.5%.
In summary, the industrial internet equipment authentication method based on multi-mode information fusion provided by the invention has excellent safety and efficiency in simulation experiments. The system not only can effectively resist unauthorized access and information tampering attacks, but also can maintain high-level performance under high-load conditions.
The foregoing description is only illustrative of the invention and is not to be construed as limiting the invention. Various modifications and variations of the present invention will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the scope of the present invention.