This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2017-070154, filed on Mar. 31, 2017, the entire contents of which is incorporated herein by reference.
The present disclosure relates to a sensor management system, a sensor management method, a recording medium recorded with a sensor management program, and a sensor management device, and may be applied in situations in which, for example, data collected by sensors is transmitted to a server via a network.
Recently there have been proposals for what is referred to as the Internet of Things (IoT), in which various objects are connected over a network, in an arrangement such that various information obtained by these objects is exchanged in an interconnected manner, and, moreover, interconnected control is performed. Moreover, there are also proposals to accumulate the vast amounts of information obtained by the IoT on servers, or the like, so as to be handled in what is referred to as big data, for various purposes.
In the IoT, sometimes wireless communication functionality is installed in sensor devices for collecting data, and a gateway device is provided that includes wireless communication functionality compatible with that of the sensor devices, in order to facilitate installation by rendering wiring installation unnecessary. In such cases, the wireless communication employed is assumed to be, for example, a wireless local area network (LAN), BLUETOOTH (registered trademark), or the like, with communication distances being comparatively close distances of the order of several meters or several tens of meters.
The gateway device is also connected to a network such as the Internet, and is able transmit data that has been transmitted from sensor devices by wireless communication, via the network, to a predetermined server device. Such a gateway device is generally provided with various security functionality, such as encryption functionality and authorization functionality, or Denial of Service (DoS) detection functionality, so as to ensure the confidentiality, integrity, and availability of communication.
One proposal is a gateway device that identifies whether or not a sensor device (also referred to as a client device) is a legitimate pre-registered sensor device in response to a connection request transmitted from the sensor device (see, for example, Japanese Patent Application Laid-Open (JP-A) No. 2017-46338 (FIG. 2, etc.)).
However, what are referred to as low power wide area (LPWA) technologies are recently being proposed as wireless communication technologies suited for the IoT. In LPWA, communication distances are intermediate to long distances of, for example, several kilometers to several tens of kilometers, rendering relay by a gateway device unnecessary, and employing direct communication between sensor devices and base stations installed by communication providers and the like.
However, there is a concern that a sensor device that does not include sufficient security functionality could be subject to unauthorized external access over LPWA, resulting in various problems such as the leakage or alteration of data, or the establishment of a stepping stone for unauthorized access to other network devices.
The present disclosure provides a sensor management system capable of determining a communication method appropriate to a sensor device, while ensuring security, and to a sensor management method, a sensor management program, and a sensor management device of the same.
A sensor management system of the present disclosure includes: a sensor device that collects data and transmits the collected data by a first communication method or a second communication method; a sensor management device including predetermined security functionality, wherein the sensor management device receives the data in a case in which the data has been transmitted from the sensor device by the first communication method and transmits the received data to a predetermined network; a communication device that relays the data to the network in a case in which the data has been transmitted from the sensor device by the second communication method; and a server device that receives the data from the sensor management device or from the communication device via the network. The sensor management device includes a communication method determination unit that determines, based on a security configuration included in the sensor device, a communication method for use by the sensor device, in a case of transmitting the data, to be either the first communication method or the second communication method.
Explanation follows regarding embodiments for implementing the invention (referred to hereinafter as exemplary embodiments), with reference to the drawings.
1-1. Sensor Management System Configuration
As illustrated in
1-1-1. Server Device and LPWA Base Station Configuration
As illustrated in the schematic block diagram of
The control unit 11 is configured around a central processing unit (CPU), reads a predetermined program from read only memory (ROM), flash memory, or the like, and uses random access memory (RAM) as a work area while executing various processing, such as data accumulation processing.
The storage unit 12 is a non-volatile information storage medium such as, for example, a hard disk drive or flash memory, and the storage unit 12 stores various programs and various setting information, or various data transmitted from the sensor devices 6, and the like. Information relating to a communication method for the sensor devices 6 is also stored in the storage unit 12.
The communication unit 14 is, for example, an interface of a wired local area network (LAN) based on a standard such as the Institute of Electrical and Electronics Engineers (IEEE) 802.3u/ab standard, and the communication unit 14 is connected to the Internet 2 (
The display unit 17, serving as a presentation unit, is a display device such as a liquid crystal panel. The display unit 17 displays screen data supplied from the control unit 11 so as to present various types of information to a user of the server device 3. The operation unit 18 is, for example, a keyboard or a mouse. The operation unit 18 generates operation instructions in accordance with input operations from a user of the server device 3 and supplies the input operations to the control unit 11.
The LPWA base station 4 (
LPWA refers to standardized communication technologies mainly used in the IoT field. LPWA utilizes frequency bands such as the 868 MHz band, the 915 MHz band, or the 920 MHz band, has transmission distances of one kilometer to several tens of kilometers, and has maximum transmission speeds of one hundred kilobytes to several hundred kilobytes per second (kbps). More precisely, several communication technologies, such as SIGFOX (registered trademark) and LoRaWAN, have been proposed by businesses and other industry organizations. For ease of explanation, hereinafter LPWA will be referred to as a second communication method.
1-1-2. Gateway Device Configuration
As illustrated in the schematic block diagram of
Similarly to the control unit 11 (
The storage unit 22 is, for example, a non-volatile information storage medium such as, for example, flash memory, and the storage unit 22 stores various programs and various setting information. Moreover, a security condition, which is a condition to determine the communication method according to the security functionality of each of the sensor devices 6, is stored in the storage unit 22 as a communication method setting table T1, as illustrated in
The communication method setting table T1 is prepared with headings for “security functionality” and “communication method”, is stored with “YES” or “NO” as values for the “security functionality”, and is stored with “LPWA” or “FAN” as respective values for the “communication method” associated therewith. Namely, in the communication method setting table T1, “security functionality included” is stipulated as a security condition in determining LPWA as the communication method.
Similarly to the communication unit 14 of the server device 3, the wired communication unit 24 serving as a network-side communication unit is, for example, an interface of a wired LAN based on a standard such as the IEEE 802.3u/ab standard, and the communication unit 24 is connected to the Internet 2 (
The FAN communication unit 25 serving as a sensor-side communication unit is an interface for a wireless LAN based on a standard such as IEEE 802.11a/b/g/n/ac, BLUETOOTH (registered trademark), or the like, or a wireless communication standard for comparatively close communication distances, such as, for example, Wireless-Smart Utility Network (Wi-SUN), based on a standard such as IEEE 802.15.4g. The FAN communication unit 25 includes an antenna, a signal processing circuit, and the like. For ease of explanation, hereinafter FAN will be referred to as a first communication method.
When supplied with data from the control unit 21 or the like, the FAN communication unit 25 implements predetermined processing on the data such as packetization, followed by converting the data into a wireless signal, and emits the wireless signal from the antenna as FAN waves. Moreover, the FAN communication unit 25 receives FAN waves from the sensor devices 6 (
The display unit 27 is, for example, an indicator or the like employing a liquid crystal panel or a light emitting diode (LED), and, under control of the control unit 21, displays information such as predetermined text, images, and the like on the liquid crystal panel, or causes the LED to illuminate or be extinguished. The operation unit 28 is configured, for example, by plural operation buttons, and receives operational input by a user and notifies the control unit 21 thereof.
Thus configured, after, for example, receiving electromagnetic waves from the sensor devices 6 using the antenna of the FAN communication unit 25, the gateway device 5 converts these waves into data (packets or the like) using the signal processing unit, and transmits this data from the wired communication unit 24 to the Internet 2. Moreover, under control of the control unit 21, the gateway device 5 is able to transmit and receive various information to and from the sensor devices 6 by wireless communication employing the FAN communication unit 25.
The security processing unit 23 is configured, for example, so as to be able to execute various processing related to security, such as encryption processing, authentication processing, and Denial of Service (DoS) detection processing. The gateway device 5 is thereby able to perform various processing related to security using the security processing unit 23, such as for example encrypting information to transmit to the sensor devices 6, and performing authentication processing with an authentication server, or detecting and taking countermeasures against a DoS attack over the Internet 2.
1-1-3. Sensor Device Configuration
As illustrated in the schematic block diagram of
Similarly to the control unit 11 (
Similarly to the storage unit 22 of the gateway device 5, the storage unit 32, for example, is a non-volatile information storage medium such as, for example, flash memory, and the storage unit 32 stores various programs and various setting information. Various information related to the sensor devices 6 themselves is stored as device information in the storage unit 32. The device information includes, for example, a manufacturer name, model name, and the like of each of the sensor devices 6, a serial number or the like, a uniquely assigned device identifier (ID), network addresses, and furthermore, information indicating the type of data collected in the sensor unit 36, described later.
The LPWA communication unit 34 is an LPWA communication interface compatible with the LPWA base station 4 (
The FAN communication unit 35 is a FAN communication interface compatible with the gateway device 5 (
The sensor unit 36 is, for example, a temperature/humidity sensor. The sensor unit 36 measures the temperature and humidity of the surroundings, generates data indicating the temperature and humidity (namely, collects data), and supplies this data to the control unit 31. For ease of explanation, hereinafter such data is also referred to as sensing data.
However, as illustrated in
The storage unit 32 moreover also stores, as part of the above device information, security functionality information to indicate the presence or absence of security functionality by using a security information table T2 (T2A or T2B) as illustrated in
The security information table T2B illustrated in
In this manner, the sensor devices 6 are configured so as to be able to communicate information using two types of communication methods, LPWA and FAN. In addition, as part of device information stored in the storage unit 32, security functionality information to indicate the presence or absence of the security processing unit 33 in the sensor device 6 is stored in the security information table T2.
1-2. Communication Method Determination Processing
In the sensor management system 1, the sensor devices 6 are managed by the gateway device 5, and, configuration is made such that, as part of the management, the communication method is determined according to the presence or absence of security functionality in each of the sensor devices 6.
More precisely, in the sensor management system 1, in accordance with the sequence chart illustrated in
When power is switched ON to the control unit 31 of the sensor devices 6, a processing sequence RT1 is started and processing transitions to step SP11. At step SP11, the control unit 31 executes predetermined start-up processing and the like, and then processing transitions to the next step SP12. At step SP12, the control unit 31 notifies the gateway device 5 with a power ON notification signal by FAN via the FAN communication unit 35 (
In the sensor management system 1, the gateway device 5 exchanges various information with the plural sensor devices 6. When transmitting information by FAN to the gateway device 5, the sensor devices 6 append a device ID or the like to the information such that each of the sensor devices 6 is identifiable by the gateway device 5.
At step SP21 of the processing sequence RT2, the control unit 21 of the gateway device 5 waits to receive the power ON notification signals from the sensor devices 6, and processing transitions to step SP22 when the power ON notification signal is received from one of the sensor devices 6 by the FAN communication unit 25 (
On receipt of an enquiry from the gateway device 5 regarding security functionality using the FAN communication unit 35, the control unit 31 of the sensor device 6 transitions to the next step SP13, and transmits a reply regarding security functionality to the gateway device 5. More precisely, the control unit 31 reads security functionality information from the security information table T2 (
On receipt of security functionality information from one of the sensor devices 6 using the FAN communication unit 25 (
When an affirmative result is obtained, this means that the sensor device 6 is a sensor device 6B (
However, when a negative result is obtained at step SP41, this means that the sensor device 6 is a sensor device 6A (
At step SP44, in the communication method determination unit 21A of the control unit 21, the communication method determination processing sequence RT4 subroutine ends, and then processing transitions to the next step SP24 of the original processing sequence RT2 (
On receipt of the notification of the communication method that should be set from the gateway device 5 using the FAN communication unit 35, in the control unit 31 of the sensor device 6, processing transitions to the next step SP14, then after the notified communication method (FAN or LPWA) has been set, processing transitions to the next step SP15, and the processing sequence RT1 ends.
At step SP25, the control unit 21 of the gateway device 5 uses the wired communication unit 24 (
At step SP31 of the processing sequence RT3, the control unit 11 of the server device 3 awaits receipt of notification of information related to the sensor device 6 from the gateway device 5. When the control unit 11 receives notification from the gateway device 5 using the communication unit 14 (
Thus, in the sensor management system 1, the communication method is set according to the security functionality of the sensor devices 6. For example, the communication method is set to FAN for sensor devices 6A (
Moreover, for example, the communication method is set to LPWA for sensor devices 6B (
The server device 3 (
In the communication route display screen D1, the Internet 2, the server device 3, the LPWA base station 4, the gateway device 5, and the sensor devices 6A and 6B are represented by predetermined graphic symbols F2, F3, F4, F5, and F6A and F6B, respectively. Moreover, in the communication route display screen D1, each of the graphic symbols F2, etc. are connected together by bent lines or the like according to the communication routes that are actually formed. Namely, each of the communication routes in the sensor management system 1 is displayed on the communication route display screen D1 as an image.
Therein, a wireless connection between the graphic symbols F6A and F5 is indicated by a bent double-arrow-headed line, together with the text “FAN” in the vicinity thereof, thereby representing that the communicative connection between the sensor device 6A and the gateway device 5 is by FAN. Moreover, a wireless connection between the graphic symbols F6B and F4 is indicated by a bent double-arrow-headed line, together with the text “LPWA” in the vicinity thereof, thereby representing that the communicative connection between the sensor device 6B and the LPWA base station 4 is by LPWA.
Moreover, in the communication route display screen D1, the periphery of the graphic symbols F5 and the graphic symbols F6A and F6B are surrounded by a broken line frame R1, thereby representing that the sensor devices 6A and 6B are both managed by the gateway device 5, and that their respective communication methods are determined by the gateway device 5.
1-3 Results
In the configuration described above, in the sensor management system 1 of the first exemplary embodiment, the presence of security functionality in the sensor devices 6 is used as a security condition, and the communication method is determined by the communication method determination unit 21A provided in the control unit 21 of the gateway device 5 according to whether or not the security condition is satisfied.
Namely, in the sensor management system 1, the communication method is set to LPWA when the sensor device 6 is a sensor device 6B (
In other words, in the sensor management system 1, the security of the sensing data and security of the sensor device 6B itself can be ensured by performing LPWA communication while utilizing the security processing unit 33 of the sensor device 6B, enabling the processing burden on the gateway device 5 to be reduced.
However, in the sensor management system 1, when the sensor device 6 is a sensor device 6A (
Namely, although the sensor device 6A includes the LPWA communication unit 34, the sensor device 6A does not use the LPWA communication unit 34 and instead performs communication processing by FAN using the FAN communication unit 35. In such cases, in place of the sensor device 6A lacking security functionality, the gateway device 5 is able to prevent the theft or alteration of the sensing data by using the functionality of the security processing unit 23 for encryption processing, authentication processing, and the like, and moreover, is able to take countermeasures against external attacks and the like over the Internet 2 by using DoS detection processing and the like.
In other words, in the sensor management system 1, the security of the sensing data and the sensor device 6A can be ensured by stopping LPWA communication by a sensor device 6A lacking security functionality and by instead using the gateway device 5, without adding security functionality to the sensor device 6A.
When viewed from another perspective, in the sensor management system 1, when a new sensor device 6 is installed, the appropriate communication method can be set according the presence or absence of security functionality in the sensor device 6 simply by switching the power to the sensor device 6 ON, enabling both security to be ensured and also a high level of processing burden reduction to be achieved in the gateway device 5.
Moreover, in the sensor management system 1, the communication routes between each of the units in the sensor management system 1 can be displayed as the communication route display screen D1 (
According to the configuration described above, in the sensor management system 1 according to the first exemplary embodiment, the communication method is determined by the gateway device 5 according to the presence or absence of the security functionality in the sensor devices 6. Namely, the communication method is set to LPWA for sensor devices 6B including security functionality, enabling security to be ensured by the security processing unit 33 of the sensor device 6B, and enabling the processing burden on the gateway device 5 to be reduced. However, the communication method is set to FAN for sensor devices 6A lacking security functionality, enabling security to be ensured by the security processing unit 23 of the gateway device 5 while maintaining a simple configuration. Thus, in the sensor management system 1, sensing data can be safely transmitted from each of the sensor devices 6, and moreover, countermeasures can be taken against external attacks and the like over the Internet 2.
In the second exemplary embodiment, a communication method setting condition, which is a condition to determine the communication method for each of the sensor devices 6, is stored in a storage unit 22 (
The communication method setting table T3 is prepared with headings for “DoS detection functionality” and “communication method”, is stored with “YES” or “NO” as values for the “DoS detection functionality”, and is stored with “LPWA” or “FAN” as values for the “communication method” associated therewith. Namely, the communication method setting table T3, “includes DoS detection functionality” is stipulates as a security condition in determining LPWA as the communication method.
Moreover, in the second exemplary embodiment, as illustrated in
More precisely, the security processing unit 33 in the sensor device 6A is provided with an encryption/authentication processing unit 33A. Although the security processing unit 33 has encryption functionality and authorization functionality, which are comparatively low-level security functionality, the security processing unit 33 does not have DoS detection functionality, which is comparatively high-level security functionality.
Accordingly, as illustrated in
However, the security processing unit 33 of the sensor device 6B (
Furthermore, in the second exemplary embodiment, when determining the communication method for the sensor devices 6 according to a sequence chart (
Namely, in the control unit 21 of the gateway device 5 (
When an affirmative result is obtained, this means that the sensor device 6 is a sensor device 6B (
However, when a negative result is obtained at step SP51, this means that the sensor device 6 is a sensor device 6A (
At step SP54, in the control unit 21, the communication method determination processing sequence RT5 subroutine ends, and after processing has transitioned to the next step SP24 in the original processing sequence RT2 (
In the above configuration, in the second exemplary embodiment, the presence of DoS detection functionality as part of security functionality in the sensor devices 6 is used as a security condition by the communication method determination unit 21A (
Namely, in the sensor management system 1, the communication method is set to LPWA when the sensor device 6 is a sensor device 6B (
However, in the sensor management system 1, when the sensor device 6 is a sensor device 6A (
With regards to the sensor device 6A, the processing burden on the gateway device 5 can be reduced due to executing the encryption processing and authentication processing of the security functionality in the encryption/authentication processing unit 33A (
Regarding other points, similar operation and advantageous effects are exhibited in the sensor management system 1 of the second exemplary embodiment to those of the first exemplary embodiment.
According to the above configuration, the sensor management system 1 according to the second exemplary embodiment determines the communication method using the gateway device 5 according to the presence or absence of DoS detection functionality in the security functionality of the sensor device 6. Namely, the communication method is set to LPWA for sensor devices 6B including DoS detection functionality, enabling the processing burden on the gateway device 5 to be reduced, and also enabling countermeasures against DoS attacks to be taken by the DoS detection processing unit 33B in the security processing unit 33 of the sensor device 6B. However, the communication method is set to FAN for sensor devices 6A lacking DoS detection functionality, enabling countermeasures against DoS attacks to be taken by the security processing unit 23 of the gateway device 5 while maintaining a simple configuration. Thus in the sensor management system 1, sensing data can be safely transmitted from each of the sensor devices 6, and moreover, countermeasures against external attacks and the like over the Internet 2 can be taken.
In a third exemplary embodiment, a communication method setting condition, which is a condition to determine the communication method of each of the sensor devices 6, is stored in a storage unit 22 (
The communication method setting table T5 is prepared with two main categories “DoS detection functionality” and “data category”. The “DoS detection functionality” is prepared with sub-categories of “YES” or “NO”, and the “data category” is prepared with sub-categories of “temperature/humidity” and “video/audio”.
In addition, the communication method setting table T5 is stored with “LPWA” as the “communication method” only for the combination in which “DoS detection functionality” is “YES” and the “data category” is not “video/audio” (namely, for “temperature/humidity”). “FAN” is stored for all other combinations. Namely, in the communication method setting table T5, “DoS detection functionality included, and data category not video/audio” is stipulated as the security condition for determining the communication method to be LPWA.
Moreover, in the third exemplary embodiment, as illustrated in
More precisely, a video/audio sensor 36A, configured, for example, by a camera to image video and a microphone to pick up audio, is provided in the sensor unit 36 of the sensor device 6A. This sensor unit 36 thereby generates sensing data including a video signal and an audio signal.
As illustrated in
In the sensor unit 36 of the sensor device 6B, a temperature/humidity sensor 36B is configured by a temperature sensor to measure the temperature of the surroundings, a humidity sensor to measure the humidity of the surroundings, and the like. The sensor unit 36 accordingly generates sensing data representing measurement results of temperature and humidity.
As illustrated in
Furthermore, in the third exemplary embodiment, when determining the communication method of the sensor device 6 according to a sequence chart (
Namely, in the control unit 21 of the gateway device 5 (
When an affirmative result is obtained, this means that suppose the sensor device 6 were to exchange information by LPWA with the LPWA base station 4, the sensor device 6 would be able to take appropriate countermeasures against external DoS attacks over the Internet 2. In other words, the sensor device 6 has at least sufficient functionality in terms of security functionality to exchange information by LPWA. In such cases, in the control unit 21, processing transitions to the next step SP62.
At the step SP62, the control unit 21 determines whether or not the data category for the sensor device 6 is video/audio. Obtaining a negative determination result here means that the sensor device 6 is a sensor device 6B including the temperature/humidity sensor 36B (
However, when a negative determination result is obtained at step SP61, this means that the sensor device 6 lacks a DoS detection processing unit in the security processing unit 33, and thus possesses insufficient security functionality to exchange information by LPWA. In such cases, in the control unit 21, processing transitions to the next step SP64.
Moreover, when an affirmative determination result is obtained at step SP62, this means that the sensor device 6 is a sensor device 6A (
At step SP64, in the control unit 21, after determining the communication method that should be used by this sensor device 6 to be FAN, processing transitions to the next step SP65. The sensor device 6 is accordingly able to communicate utilizing the security functionality included in the security processing unit 23 of the gateway device 5.
At step SP65, in the control unit 21, after the communication method determination processing sequence RT6 subroutine ends, and after processing transitions to the next step SP24 in the original processing sequence RT2 (
In the above configuration, in the third exemplary embodiment, the presence of DoS detection functionality in the sensor device 6 and the category of the data to be generated not being video/audio is used as a security condition by the communication method determination unit 21A (
Namely, in the sensor management system 1, the communication method is set to LPWA when the sensor device 6 is a sensor device 6B (
In such cases, the sensor device 6B includes the DoS detection processing unit 33B in the security processing unit 33, and is accordingly able to take appropriate countermeasures against external DoS attacks over the Internet 2. Moreover, the sensing data transmitted from the sensor device 6B is measurement results for temperature and humidity, and even supposing these were to be stolen by a third party, the possibility of this leading to a major data breach is extremely low. Thus, the necessary sufficient protection is obtained even with the security processing unit 33 of the sensor device 6B generally having lower performance than the security processing unit 23 of the gateway device 5.
However, in the sensor management system 1, sensing data is transmitted by FAN communication with the gateway device 5 when the sensor device 6 is a sensor device 6A (
Regarding other points, the sensor management system 1 according to the third exemplary embodiment exhibits similar operation and advantageous effects to those of the first exemplary embodiment.
According to the above configuration, in the sensor management system 1 according to the third exemplary embodiment, the communication method by the gateway device 5 is determined according to the presence or absence of DoS detection functionality in the security functionality of the sensor device 6 and according to the data category. Namely, the processing burden on the gateway device 5 can be reduced while ensuring sufficient necessary security using the security processing unit 33 by setting LPWA as the communication method for sensor devices 6B including DoS detection functionality and having a data category of temperature/humidity. However, for sensor devices 6A in which the data category is video/audio, the sensing data and the like can be strongly protected by setting FAN as the communication method and using the security processing unit 23 of the gateway device 5. Thus in the sensor management system 1, the sensing data can be safely transmitted from each of the sensor devices 6, and moreover, countermeasures against external attacks and the like over the Internet 2 can be taken.
In a fourth exemplary embodiment, a communication method setting condition, which is a condition to determine the communication method of each of the sensor devices 6, is stored in a storage unit 22 (
From out of the communication method setting tables, the communication method setting table T7A is similar to the communication method setting table T3 (
In cases in which, for example, the model name “AA1234” is the name of a model in which problems have been found with the security processing unit 33 of the sensor device 6, the communication method setting table T7B is provided for the purpose of setting the communication method of the sensor device 6 to “FAN” so as to avoid using the security processing unit 33. In the storage unit 22 of the gateway device 5, at the initial stage there is only the communication method setting table T7A stored therein, and in practice this is similar to the second exemplary embodiment, however the communication method setting table T7B is added later thereto.
Moreover, in the fourth exemplary embodiment, similarly to in the third exemplary embodiment (
More precisely, the model name of the sensor device 6A is “BB0001”. Thus, as illustrated in
However, the model name of the sensor device 6B is “AA1234”. Thus, as illustrated in
Furthermore, in the fourth exemplary embodiment, when determining the communication method of the sensor device 6 according to a sequence chart (
Namely, in the control unit 21 (
When an affirmative result is obtained, this means that suppose the sensor device 6 were to exchange information by LPWA with the LPWA base station 4, the sensor device 6 would normally be able to take appropriate countermeasures against external DoS attacks over the Internet 2. In such cases, in the control unit 21, processing transitions to the next step SP72.
At step SP72, the control unit 21 determines whether or not the model name of the sensor device 6 is “AA1234”. Obtaining a negative determination result here means that there is no problem with the security processing unit 33 of the sensor device 6, and so is available for use. In such cases, in the control unit 21, processing then transitions to the next step SP73, and after determining the communication method that should be used by the sensor device 6 to be LPWA, processing transitions to the next step SP75.
However, when a negative determination result is obtained at step SP71, this means that the security processing unit 33 of the sensor device 6 lacks a DoS detection processing unit, meaning that there is insufficient security functionality for exchange information by LPWA. In such cases, in the control unit 21, processing transitions to the next step SP74.
Moreover, when a negative determination result is obtained at step SP72, this means that the model name of the sensor device 6 is “AA1234”, and there is accordingly a problem with the security processing unit 33 therein, so LPWA should not be employed as the communication method. In such cases, in the control unit 21, processing transitions to the next step SP74.
At step SP74, in the control unit 21, after determining the communication method that should be used by the sensor device 6 to be FAN, processing transitions to the next step SP75. The sensor device 6 is accordingly able to communicate utilizing the security functionality included in the security processing unit 23 of the gateway device 5.
At step SP75, in the control unit 21, after the communication method determination processing sequence RT7 subroutine ends, and after processing transitions to the next step SP24 in the original processing sequence RT2 (
In the above configuration, in the fourth exemplary embodiment, the presence of DoS detection functionality in the sensor device 6 and the model name of the sensor device 6 not being “AA1234” is used as a security condition by the communication method determination unit 21A (
Namely, in the sensor management system 1, when the sensor device 6 includes the DoS detection processing unit 33B and the model name other than “AA1234”, such as “BB0001”, the communication method is set to LPWA and the sensing data is transmitted by LPWA communication between the sensor device 6 and the LPWA base station 4, without passing through the gateway device 5. In such cases, the sensor device 6 is able to take appropriate countermeasures against external DoS attacks over the Internet 2 due to the DoS detection processing unit 33B being included in the security processing unit 33.
However, in the sensor management system 1, in cases in which the model name is “AA1234”, the sensing data is transmitted between the sensor device 6 and the gateway device 5 by FAN communication even though the sensor device 6 includes DoS detection functionality in its security functionality. Namely, although such a sensor device 6 includes the security processing unit 33, due to a problem having been found therewith, it would be inappropriate use the security processing unit 33 to communicate by LPWA, and so communication processing is performed by FAN using the FAN communication unit 35 despite the LPWA communication unit 34 being included. In such cases, regular security processing can be performed by the security processing unit 23 of the gateway device 5, enabling the sensing data and the sensor device 6 to be appropriately protected.
In the fourth exemplary embodiment, for example, the communication method setting table T7B is erased from the storage unit 22 of the gateway device 5 in cases in which the model name of the sensor device 6B is “AA1234”, and the problem with the security processing unit 33 has been eliminated by updating firmware, replacing a component, or the like. Accordingly, when the control unit 21 of the gateway device 5 sets the communication method of the sensor device 6 according to a sequence chart (
Regarding other points, similar operation and advantageous effects are exhibited in the sensor management system 1 according to the fourth exemplary embodiment to those of the first exemplary embodiment.
According to the above configuration, the sensor management system 1 according to the fourth exemplary embodiment determines the communication method using the gateway device 5 according to the presence or absence of DoS detection functionality in the security functionality of the sensor device 6 and according to the model name thereof. Namely, the processing burden on the gateway device 5 can be reduced while ensuring sufficient necessary security using the security processing unit 33 by setting LPWA as the communication method for sensor devices 6B including DoS detection functionality and having a model name other than the name “AA1234”. However, for sensor devices 6A in which the model name is “AA1234”, the communication method is set to FAN, and sensing data and the like is protected by the security processing unit 23 of the gateway device 5. Thus, in the sensor management system 1, the sensing data can be safely transmitted from each of the sensor devices 6, and moreover, countermeasures against external attacks and the like over the Internet 2 can be taken.
Note that examples were given of cases in which the security condition was “security functionality included” (
Moreover, in the third exemplary embodiment, a case was given in which the security condition was “the sensor device 6 including DoS detection functionality and the category of data to be generated not being video/audio”. Furthermore, in the fourth exemplary embodiment, a case was given in which the security condition was “the sensor device 6 including DoS detection functionality and the model name of the sensor device 6 not being “AA1234””. However, the present disclosure is not limited thereto, and, for example, “the sensor device 6 includes DoS detection functionality and was manufactured by a predetermined manufacturer”, or the like, may be employed as the security condition, or a combination of security functionality and various other requirements may be employed as the security condition.
Moreover, in the first exemplary embodiment, a case was given in which the security information table T2 (
Furthermore, in the third exemplary embodiment described above, a case was given in which the security condition was only the one condition of “the sensor device 6 including DoS detection functionality and the category of data to be generated not being video/audio”. However, the present disclosure is not limited thereto, and, for example, a security condition may be provided for each category of data.
Furthermore, in the first exemplary embodiment described above, a case was given in which in the sequence chart (
Furthermore, in the first exemplary embodiment described above, a case was given in which in the sequence chart (
Furthermore, in the first exemplary embodiment described above, a case was given in which, on the communication route display screen D1 (
Furthermore, in the first exemplary embodiment described above, a case was given in which temperature and humidity data is collected by the sensor unit 36. However, the present disclosure is not limited thereto, and various data may be collected by the sensor unit 36 such as, for example, video/audio, or illumination and sound levels or the like. Similar applies to the second to the fourth exemplary embodiments.
Furthermore, in the first exemplary embodiment described above, a case was given in which the processing sequence RT1 (
Furthermore, in the first exemplary embodiment described above, a case was given in which the communication method determination program was pre-stored in the flash memory, the storage unit 22, or the like in the control unit 21 of the gateway device 5. However, the present disclosure is not limited thereto, and, for example, the communication method determination program may be downloaded from the server device 3 or another server connected to the Internet 2, and stored, and then this communication method determination program executed. Similar applies to the second to the fourth exemplary embodiments.
Furthermore, in the exemplary embodiments described above, a case was given in which, when the sensor devices 6 are compatible with two communication methods, LPWA and FAN, the communication method of each of the sensor devices 6 is determined by the gateway device 5 to be one of these. However, the present disclosure is not limited thereto, and, in cases in which the sensor devices 6 are compatible with two or more of various types of communication method, the communication method of each of the sensor devices 6 may be determined by the gateway device 5 to be any thereof.
Furthermore, the present disclosure is not limited to each of the exemplary embodiments and the other exemplary embodiments described above. Namely, the present disclosure has a scope of application encompassing freely selected combinations of part or all of the exemplary embodiments and the other exemplary embodiments described above, and exemplary embodiments from which part has been extracted.
Furthermore, in the exemplary embodiments described above, cases were given in which the sensor management system 1 serving as a sensor management system includes the sensor devices 6 (6A and 6B) serving as sensor devices, the gateway device 5 serving as a sensor management device, the LPWA base station 4 serving as a communication device, the server device 3 serving as a server device, and in which the sensor management device is configured by the communication method determination unit 21A serving as a communication method determination unit. However, the present disclosure is not limited thereto, and, the sensor management system may be configured from sensor devices, a sensor management device, a communication device, and a server device of various other configurations, and the sensor management device may be configured by a communication method determination unit of various other configurations.
The present disclosure may, for example, be utilized in cases in which a communication method is determined for a sensor device compatible with plural communication methods.
A sensor management system of the present disclosure includes: a sensor device that collects data and transmits the collected data by a first communication method or a second communication method; a sensor management device including predetermined security functionality, wherein the sensor management device receives the data in a case in which the data has been transmitted from the sensor device by the first communication method and transmits the received data to a predetermined network; a communication device that relays the data to the network in a case in which the data has been transmitted from the sensor device by the second communication method; and a server device that receives the data from the sensor management device or from the communication device via the network. The sensor management device includes a communication method determination unit that determines, based on a security configuration included in the sensor device, a communication method for use by the sensor device, in a case of transmitting the data, to be either the first communication method or the second communication method.
Moreover, a sensor management method for a sensor management system of the present disclosure includes: a sensor device that collects data and transmits the collected data by a first communication method or a second communication method, a sensor management device including predetermined security functionality, wherein the sensor management device receives the data in a case in which the data has been transmitted from the sensor device by the first communication method and transmits the received data to a predetermined network, a communication device that relays the data to the network in a case in which the data has been transmitted from the sensor device by the second communication method, and a server device that receives the data from the sensor management device or from the communication device via the network, the sensor management method comprising: using a predetermined communication unit to identify a security configuration included in the sensor device; and using a predetermined communication method determination unit to determine, based on the identified security configuration, a communication method for use by the sensor device, in a case of transmitting the data, to be either the first communication method or the second communication method.
Furthermore, a recording medium storing a sensor management program of the present disclosure is executable by a processor of a sensor management device in a sensor management system. The sensor management system includes: a sensor device that collects data and transmits the collected data by a first communication method or a second communication method, a sensor management device including predetermined security functionality, wherein the sensor management device receives the data in a case in which the data has been transmitted from the sensor device by the first communication method and transmits the received data to a predetermined network, a communication device that relays the data to the network in a case in which the data has been transmitted from the sensor device by the second communication method, and a server device that receives the data from the sensor management device or from the communication device via the network. The sensor management program causes the processor of the sensor management device to perform processing. The processing includes: identifying a security configuration included in the sensor device; and based on the identified security configuration, determining a communication method for use by the sensor device, in a case of transmitting the data, to be either the first communication method or the second communication method.
Furthermore, a sensor management device of the present disclosure includes: a sensor-side communication unit that receives, from a sensor device that collects data and transmits the collected data using a first communication method or a second communication method, the data in a case in which the data has been transmitted by the first communication method; a network-side communication unit that transmits the data received from the sensor device to a predetermined network; a security processing unit that performs predetermined security processing on the data received from the sensor device; and a communication method determination unit that, based on a security configuration included in the sensor device, determines a communication method for use by the sensor device when transmitting the data to be either the first communication method or the second communication method.
In the present disclosure, in cases in which a sensor device is capable of transmitting data by a first communication method or a second communication method, determination can be made according to the security functionality included in the sensor device as to whether to use the first communication method utilizing the security functionality of a communication management device, or a second communication method utilizing the security functionality of the sensor device.
The present disclosure enables the realization of a sensor management system capable of determining a communication method appropriate to a sensor device, while ensuring security, and the realization of a sensor management method, a sensor management program, and a sensor management device of the same.
Number | Date | Country | Kind |
---|---|---|---|
2017-070154 | Mar 2017 | JP | national |